The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing openings situation was compounded. The burned NPRC beams were left to gradually cool down under ambient laboratory conditions, and afterward, they were loaded until failure. The influence of temperature on the residual ultimate load-carrying capacity of each beam was studied by comparing these beams with unburned reference beams. Increasing exposure temperature reduces the ultimate strength of solid NPRC beams exposed to temperatures of 400°C and 700°C by about 5.7% and 10.84% respectively. Meanwhile, NPRC beams with trapezoidal openings showed ultimate strength reductions of 21.13% and 32.8% (for beams with 8 openings) and 28% and 34.4% (for beams with 6 openings) under the same burning conditions. The excessive mid-span deflections for these three types of beams were 2%–30.8%, 1.33%–21.8%, and 1.5%–17.4% under the same burning conditions.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
This paper is an attempt to demonstrate the syntactic behavior of -ly adverbs and -ly adjectives. It mainly deals with -ly as an inflectional suffix that forms adverbs and adjectives It is hypothesized that there are differences between adjective-forming –ly and adverb-forming –ly.The researcher first made general and specific observations about the morphological processes of -ly adverbs and -ly adjectives. Since the study focuses on a linguistic phenomenon, its data is a set of -ly adverbs and -ly adjectives used as examples to support the hypothesis. The importance of studying the syntactic behavior of -ly stems from the fact that thousands of English adjectives and adverbs are created by adding the suffix "-ly" to their roots
... Show MoreAll the stiffened and unstiffened elastic constants for lead germanate (Pb5Ge3O11) single
crystal have been measured from room temperature 298 K up to 513K by using ultrasonic
pulse superposition technique. The correction of piezoelectric stiffening has been used to
obtain the unstiffened elastic constants. Elastic moduli of lead germanate (C11, C33, C12, C13,
C44 and C66) decrease with the increase of temperature. C11, C33, C
12 and C13 suffered a dip at
transition temperature but they increase with the increase of temperature just above Curie
temperature between 453 and 473 K because of their positive temperature coefficients in this
range, and then decrease slightly (except C12 increases) in the
Due to the increased of information existing on the World Wide Web (WWW), the subject of how to extract new and useful knowledge from the log file has gained big interest among researchers in data mining and knowledge discovery topics.
Web miming, which is a subset of data mining divided into three particular ways, web content mining, web structure mining, web usage mining. This paper is interested in server log file, which is belonging to the third category (web usage mining). This file will be analyzed according to the suggested algorithm to extract the behavior of the user. Knowing the behavior is coming from knowing the complete path which is taken from the specific user.
Extracting these types of knowledge required many of KDD
Improving the accuracy of load-deformation behavior, failure mode, and ultimate load capacity for reinforced concrete members subjected to in-plane loadings such as corbels, wall to foundation connections and panels need shear strength behavior to be included. Shear design in reinforced concrete structures depends on crack width, crack slippage and roughness of the surface of cracks.
This paper illustrates results of an experimental investigation conducted to investigate the direct shear strength of fiber normal strength concrete (NSC) and reactive powder concrete (RPC). The tests were performed along a pre-selected shear plane in concrete members named push-off specimens. The effectiveness of concrete compressiv
... Show MoreIn this paper, the behavior of spliced steel girders under static loading is investigated. A group of seven steel I-girders were tested experimentally. Two concentrated loads were applied to each specimen at third points and the load was increased incrementally up to the yield of the specimen. Two types of splices were considered; the bearing type and the friction-grip type splices. For comparison, an analytical study was made for the tested girders in which the finite element analysis program (Abaqus) was used for analysis. It was found that the maximum test load for spliced girders with bearing type splices was in the range of (34%) to (67%) of the maximum test load for the reference girder. For girders spliced by using friction-grip t
... Show MoreThe aim of this work is to study the effect of mud compositions on it’s rheological behavior under high temperature conditions. Seventeen samples of five types of water base mud in which (fresh water bentonite mud. Lignosulphonate mud, gypsum mud, polymer mud, and salt saturated mud) were tested with different temperatures using the fann viscometer model 50-c. All the tested samples, except the fresh water bentonite mud, have the same trend reduction in both plastic viscosity and yield point with increasing temperature. Six rheological models has been adapted: Bingham plastic, power law, Casson model represent the laboratory data accurately
The research aims to clarify the role of the main variable represented by the four dimensions of entrepreneurial behavior (creative, risk-taking, seizing opportunities, proactivity), in Reducing the dependent variable of organizational anomie with the dimensions (Organizational Normlessness, Organizational Cynicism, Organizational Valuelessness).
The experimental, analytical method was adopted in the completion of the research, and an intentional sample of (162) individuals in the administrative levels (higher and middle) in the factory was taken. The questionnaire was also adopted as the main tool, which
... Show More