Carbon fiber reinforced polymers (CFRP) were widely used in strengthening reinforced concrete members
in the last few years, these fibers consist mainly of high strength fibers which increase the member capacity in addition to changing the mode of failure of the reinforced concrete beams. Experimental and theoretical investigations were carried to find the behavior of reinforced concrete beams strengthened by CFRP in shear and bending. The experimental work included testing of 12 beams divided into 4 groups; each group contains 3 beams. The following parameters were taken into consideration: - Concrete crushing strength. - CFRP strengthening location (shear strengthening and both shear and flexure strengthening). Reinforced beams were simply supported subjected to two point loads. Each group consists of three beams; the first beam without CFRP, the second one, is strengthened with CFRP in shear and the third is strengthened with CFRP in both flexure and shear. Four groups with different crushing strength of (12, 20, 30 and 39 MPa). The CFRP sheets are attached externally.
It was found that in beam with low crushing strength loads transfer to the CFRP at early stages while in
those of high crushing strength, CFRP contribution only starts when full strength of the beam is fulfilled. A
full bond between CFRP sheets and the concrete is assumed in the theoretical analysis. Comparison between the theoretical and the experimental results revealed the validity of the numerical analysis and the developed methods such that there was a difference of 13% in the ultimate strength for the tested and analyzed beams.
The objective of this study is to enable the role of modern and advanced computerized information systems. The model or mechanism should be developed by collecting the necessary information about the taxpayers and the sources of the taxpayers' income, on the basis of which the accuracy of the inventory process will be adopted. In addition to studies related to computerized information systems and showing their importance to the tax institution. To achieve the objectives of the study and to answer its questions, the researcher relied on collecting data and information on the subject on the literature and previous studies The secondary sources, which also formed the theoretical framework of the study, were obtained either as a practical fr
... Show MoreHeritage reflects peoples' memory and essence of nations. Thus, this divan was really the material and tool for writers in general and poets in specific both in their artificial innovations . Accordingly, modern writers have endeavored to bring heritage back in all its details and occurrences. Abdullwahab Al-Bayati's experience had reflected his innovative and strong link with the humanitarian heritage, in that heritage in view of Al-Bayati means both the humanitarian expertise and gains that are able to extend from past to future passing through the present.From this, the poet had not disconnected his strong link with the Arab poetic heritage .Thus, the poet had utilized the Arab poetic heritage in expressing on the Arab contrary realit
... Show MoreTicks (Acari: Ixodidae) are ectoparasites that infest livestock in every geographic region of the world and are vectors of several viral, bacterial, and protozoan pathogens to both animals and humans. There is little information is available is about tick presence in Buffalo Bubalus bubalis (Linnaeus, 1758) (Artiodactyla, Bovidae) in Iraq. The current study determined the species of ticks parasitizing Buffalo in some central and southern regions included: Baghdad (Al Fathelia), Karbala (Al-Hussainia), Wasit (Kut and Al-Suwairah), Al-Qadisia (Al- Diwaniyah, Al- Saniya, Al-Mihnawea, and Afak), Thi Qar (Al-Nasiriyah and Al-chibayish), Missan (Amara and Qalaat Salih) and Basrah (Al-Haretha, Al-Madena and Al-Deer). A total of 150 Buffal
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More