This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the deep beam is governed by the size and location of web openings. The experimental results indicated that the reduction of the shear capacity may reach (66%). ABAQUS finite element software program was used for simulation and analysis. Numerical analyses provided un-conservative estimates for deep beam load carrying capacity in the range between (5-21%). However, the maximum scatter of the finite element method predictions for first diagonal and first flexural cracking loads was not exceeding (17%). Also, at service load the numerical of midspan deflection was greater than the experimental values by (9-18%).
In this article, Pb2Ba1.7Sr0.3Ca2Cu3O10+δ superconductor material was synthesized using conventional solid-state reaction method. X-ray diffraction (XRD) analysis demonstrated one dominant phase 2223 and some impurities in the product powder. The strongest peaks in the XRD pattern were successfully indexed assuming a pseudo-tetragonal cell with lattice constants of a = 3.732, b = 3.733 and c = 14.75 Å for a Pb-Based compound. The crystallite size and lattice strain between the layers of the studied compound were estimated using several methods, namely the Scherrer, Williamson-Hall (W.H), sizestrain plot (SSP) and Halder Wagner (H.W) approach. The values of crystallite size, calculated by Scherrer, W.H, SSP and H.W methods, were 89.454077
... Show MoreLight naphtha one of the products from distillation column in oil refineries used as feedstock for gasoline production. The major constituents of light naphtha are (Normal Paraffin, Isoparaffin, Naphthene, and Aromatic). In this paper, we used zeolite (5A) with uniform pores size (5Aº) to separate normal paraffin from light naphtha, due to suitable pore size for this process and compare the behavior of adsorption with activated carbon which has a wide range of pores size (micropores and mesopores) and high surface area. The process is done in a continuous system - Fixed bed reactor- at the vapor phase with the constant conditions of flow rate 5 ml/min, temperature 180oC, pressure 1.6 bar and 100-gram weight o
... Show MoreExploitation of mature oil fields around the world has forced researchers to develop new ways to optimize reservoir performance from such reservoirs. To achieve that, drilling horizontal wells is an effective method. The effectiveness of this kind of wells is to increase oil withdrawal. The objective of this study is to optimize the location, design, and completion of a new horizontal well as an oil producer to improve oil recovery in a real field located in Iraq. “A” is an oil and gas condensate field located in the Northeast of Iraq. From field production history, it is realized the difficulty to control gas and water production in this kind of complex carbonate reservoir with vertical producer wells. In this study, a horizont
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreIn the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at
... Show MoreAt present, smooth movement on the roads is a matter which is needed for each user. Many roads, especially in urban areas geometrically improved because of the number of vehicles increase from time to time.
In this research, Highway capacity software, HCS, 2000, will be adopted to determine the effectiveness of roundabout in terms of capacity of roundabout, delay and level of service of roundabout.
The results of the analysis indicated that the Ahmed Urabi roundabout operates under level of service F with an average control delay of 300 seconds per vehicle during the peak hours.
The through movements of Alkarrada- Aljadiriya direction (Major Direction) represent the heaviest traff
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreA discussion about the repercussions of the exchange rate on the behavior of stock markets became one of the basic principles of financial economics. The Istanbul Stock Exchange , considered one of the fastest financial markets growing in the region, driven by solid economic activity, for a diversified economy which classified as one of the the fastest growing economies in the world. However, the aforementioned market witnessed sharp fluctuations in the past few months, coinciding with the continuous fluctuations in the exchange rate of the Turkish lira, posing a serious challenge to the economic and investment environment in a c
... Show MoreThe contribution rate of tax revenues in the federal budget is very small compared to the rate of contribution of oil revenues and this leads to negative repercussions on the Iraqi economy and the budget becomes a prisoner of high and low oil prices, and this is a problem that needs to be studied to know the extent of the impact of economic and political decisions on the size of tax revenue and The research goal is determined in studying the effect of amending the Unified Law No (26) of 2019 on the size of annual tax revenues . &
... Show More