The optimum design is characterized by structural concrete components that can sustain loads well beyond the yielding stage. This is often accomplished by a fulfilled ductility index, which is greatly influenced by the arrangement of the shear reinforcement. The current study investigates the impact of the shear reinforcement arrangement on the structural response of the deep beams using a variety of parameters, including the type of shear reinforcement, the number of lacing bars, and the lacing arrangement pattern. It was found that lacing reinforcement, as opposed to vertical stirrups, enhanced the overall structural response of deep beams, as evidenced by test results showing increases in ultimate loads, yielding, and cracking of 30.6, 20.8, and 100%, respectively. There was also a 53.6% increase in absorbed energy at the ultimate load. The shear reinforcement arrangement had a greater impact and a significant effect on the structural response than the number of lacing bars. For lacing reinforcement with a phase difference equivalent to the half-lacing cycle (i.e., phase lag lacing), the percentage of improvement under different loading stages was 6.7-27.1% and 20.8-113.3%, respectively. The structural responses are significantly impacted by the lacing arrangement; members with two and three lacing bars, respectively, exhibited improvements in ultimate load of 30.6% and 47%. Beyond the yielding stage, the phase lag lacing specimens deviated from those without phase lag lacing and normal shear stirrups because of the lacing contribution. Phase lag specimens showed more strain than specimens without phase lag lacing, meaning that the lacing reinforcement contributed more to the beam strength. It was found that the first shear cracking load of all the laced reinforced specimens was higher than that of the conventional shear stirrup specimens. Phase lag lacing produced the greatest improvement, with two bars achieving 92.44% and three bars achieving 217.07%. For the aforementioned number of bars, lacing shear reinforcement without phase lag was less successful, with 36.91% and 46.53%, respectively. Doi: 10.28991/CEJ-2025-011-02-019 Full Text: PDF
The aim of this study was to investigate the effectiveness of binary solvent for regeneration of spent lubricating oil by extraction-flocculation process. The regeneration was investigated by bench scale experiments by using locally provided solvents (Heavy Naphtha, n-Butanol, and iso-Butanol). Solvents to used oil, mixing time, mixing speed and temperatures were studied as operating parameters. The performance on three estimated depended key parameters, namely the percentage of base oil recovered (Yield), percent of oil loss (POL), and the percent of sludge removal (PSR) were used to evaluate the efficiency of the employed binary solvent on extraction process. The best solvent to solvent ratio for binary system were 30:70 for Heavy Naph
... Show MoreThe Main Outfall drain pumping station in Nassiriyah is an important part in operation system of the Main Outfall Drain (MOD) where it reduces the water levels in the U/S area of its and converted through Syphon freely under the Euphrates, its consists of several parts: U/S Basin, Station Building which contains 12 pumps, and Head Basin with Syphon, This station suffers from high levels especially in D/S area due to the current situation which is represented by establishing of dyke with pipes on MOD which located at 24 km from D/S of pumping station and Al-Khamisiyah Canal which located at 2.3 km from the U/S of dyke which feeds(Al Hammar Marsh) during drought season, several scenarios were adopted in order to expl
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show More