loaded reinforced concrete circular short columns. An experimental investigation into the behavior
of 24 short reinforced concrete columns with and without steel fibers was carried out. The columns
had a circular section (200 mm diameter and 900 mm long). Test variables include concrete
strength, spacing of spiral reinforcement, and inclusion of steel fibers. The axial stress and axial
strains were obtained and used to evaluate the effects of the presence of steel fibers. It was found
that the addition of steel fibers slightly improves the load carrying capacity of the tested columns
whereas it significantly enhances the ductility of these specimens. Test results also indicated that for
the same confinement parameter , specimens with steel fibers has higher strength enhancement compared to specimens without steel fibers. For confinement parameter of 0.1 the strength enhancement equal 1.7 for specimens with fibers while it is 1.4 for nonfibrous specimens. An empirical expression is proposed and used to predict the confined strength of columns. It was shown that the proposed formula predicts the load carrying capacity of the tested columns reasonably.
For the time being, the cold-formed sections are widely used due to their simple manufacturing and construction processes. To be feasible, the strength of cold-formed columns should be determined based on their post-buckling behavior. Post-buckling relations are cumbersome and need design aids similar to those of American Iron and Steel Institute (AISI) to be applicable. These design aids have been developed to sections and materials other than those available in the local market. Therefore, this paper tries to develop a general finite element model to simulate the postbuckling behavior of cold-formed steel columns. Shell element has been used to discretize the web, flanges, and lips of the column. A linear bucking analy
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreWas expanded display high reflectivity of the spectral remote infrared (m j 14-8) adoption order Alcolmtin ????????? thickness optical northeastern quarter wavelength and compared with results of previous studies based Aldrashalhalah on Ndharah matrix distinctive amended and fall of light close to the vertical arrangement multilayer materials buffer and in thin films homogeneous and uniform properties deposited on germanium basis results showed that the best choice for governments and their kills to expand bandwidth high reflectivity is much easier for the infrared than the area visible in addition to the order of these stacks is the cornerstone of the filters other visual...
MJ Abbas, AK Hussein, Journal of Physical Education, 2019
This paper is an attempt to demonstrate the syntactic behavior of -ly adverbs and -ly adjectives. It mainly deals with -ly as an inflectional suffix that forms adverbs and adjectives It is hypothesized that there are differences between adjective-forming –ly and adverb-forming –ly.The researcher first made general and specific observations about the morphological processes of -ly adverbs and -ly adjectives. Since the study focuses on a linguistic phenomenon, its data is a set of -ly adverbs and -ly adjectives used as examples to support the hypothesis. The importance of studying the syntactic behavior of -ly stems from the fact that thousands of English adjectives and adverbs are created by adding the suffix "-ly" to their roots
... Show More