This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the deep beam is governed by the size and location of web openings. The experimental results indicated that the reduction of the shear capacity may reach (66%). ABAQUS finite element software program was used for simulation and analysis. Numerical analyses provided un-conservative estimates for deep beam load carrying capacity in the range between (5-21%). However, the maximum scatter of the finite element method predictions for first diagonal and first flexural cracking loads was not exceeding (17%). Also, at service load the numerical of midspan deflection was greater than the experimental values by (9-18%).
Stone Matrix Asphalt (SMA) is a gap-graded asphalt concrete hot blend combining high-quality coarse aggregate with a rich asphalt cement content. This blend generates a stable paving combination with a powerful stone-on-stone skeleton that offers excellent durability and routing strength. The objectives of this work are: Studying the durability performance of stone matrix asphalt (SMA) mixture in terms of moisture damage and temperature susceptibility and Discovering the effect of stabilized additive (Fly Ash ) on the performance of stone matrix asphalt (SMA) mixture. In this investigation, the durability of stone matrix asphalt concrete was assessed in terms of temperature susceptibility, resistance to moisture damage, and sensitivity t
... Show MoreTwitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show MorePolymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThis paper is an attempt to demonstrate the syntactic behavior of -ly adverbs and -ly adjectives. It mainly deals with -ly as an inflectional suffix that forms adverbs and adjectives It is hypothesized that there are differences between adjective-forming –ly and adverb-forming –ly.The researcher first made general and specific observations about the morphological processes of -ly adverbs and -ly adjectives. Since the study focuses on a linguistic phenomenon, its data is a set of -ly adverbs and -ly adjectives used as examples to support the hypothesis. The importance of studying the syntactic behavior of -ly stems from the fact that thousands of English adjectives and adverbs are created by adding the suffix "-ly" to their roots
... Show MoreDetection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreBackground: One of the most common problems that encountered is postburn contracture which has both functional and aesthetic impact on the patients. Various surgical methods had being proposed to treat such problem. Aim: To evaluate the effectiveness of square flap in management of postburn contracture in several part of the body. Patients and methods: From April 2019 to June 2020 a total number of 20 patients who had postburn contracture in various parts of their body were subjected to scar contracture release using square flap. The follow up period was ranging between 6 months to 12 months. Results: All of our patients had achieved complete release of their band with maximum postoperative motion together with accepted aesthetic outcome. A
... Show MoreRoller-Compacted Concrete is a no-slump concrete, with no reinforcing steel, no forms, no finishing and wet enough to support compaction by vibratory rollers. Due to the effect of curing on properties and durability of concrete, the main purpose of this research is to study the effect of various curing methods (air curing, 7 days water curing, and permanent water curing) and porcelanite (local material used as an Internal Curing agent) with different replacement percentages of fine aggregate (volumetric replacement) on some properties of Roller-Compacted Concrete and to explore the possibility of introducing practical Roller-Compacted Concrete for road pavement with minimum requirement of curing. Specimens were sawed fro
... Show MorePermanent deformation, fatigue and thermal cracking are the three typical distresses of flexible pavement. Using hydrated lime (HL) into the conventional limestone mineral additive has been widely practiced, including in Europe, to improve the mechanical properties of hot mix asphalt (HMA) concrete and as the result the durability of the constructed pavement. Large number of experimental studies have been reported to find the optimum addition of HL for the improvement on HMA concrete mechanical properties, moisture susceptibility and fatigue resistance. Pavement in service is under complex thermomechanical stress-strain conditions due to coupled atmospheric and surrounding environment temperature variation and the traffic loading. To predic
... Show MoreAn extensive program of laboratory testing was conducted on ring footing rested on gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59%. There are limited researches available, and even fewer have been done experimentally to understand how to ring footings behave; almost all the previous works only concern the behavior of ring footing under vertical loads, Moreover, relatively few studies have examined the impact of eccentric load and inclined load on such footing. In this study, a series of tests, including dry and wet tests, were carried out using a steel container (600×600×600) mm, metal ring footing (100 mm outer diameter and 40 mm inner diameter) was placed in the m
... Show More