The provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were: number of web openings, the method used to strengthen the member at openings and the height of drop during impact tests. All beams were simply supported with load applied at mid – span. Static results indicated that T-beams with four and six un-strengthened web circular openings whose diameter is 48% of the web depth have strength capacities less than those without openings by 30% and 41%, respectively. However, strengthening of webs results in an increase in the strength capacities ranging between 27% and 92%, depending on the type of strengthening. Impact results indicated that the beam with four openings did not show a remarkable increase in the maximum mid-span deflection compared with the solid beam, while that with six openings showed an increase in the maximum mid-span deflections by about 75% greater than the maximum mid-span deflection of the solid beam. Strengthening of specimens could overcome the increase in deflections.
A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreThe main objective of this study is to develop a rate of penetration (ROP) model for Khasib formation in Ahdab oil field and determine the drilling parameters controlling the prediction of ROP values by using artificial neural network (ANN).
An Interactive Petrophysical software was used to convert the raw dataset of transit time (LAS Readings) from parts of meter-to-meter reading with depth. The IBM SPSS statistics software version 22 was used to create an interconnection between the drilling variables and the rate of penetration, detection of outliers of input parameters, and regression modeling. While a JMP Version 11 software from SAS Institute Inc. was used for artificial neural modeling.
&nb
... Show MoreIn the present study ten samples of bottled water from Baghdad conservative were taken to measure the concentration of radon gas by using nuclear track detector LR-115.The result obtained are varying from(0.033)to(0.007)pCi.l-1and these values are very low than the allowed limits (5) pCi.l-1, and specific activity from bottled water has been calculated which was vary from (0.00027)to(0.00126) Bq.l-1 and these values are very low than allowed limits (0.0123) Bq.l-1 that mean the bottled water was treated with good treatment to decrease the side effect of radon
Spectrophotometric method was developed for the determination of copper(II) ion. Synthesized (2,2[O-Tolidine-4,4-bis azo]bis[4,5-diphenyl imidazole]) (MBBAI) was used as chromogenic reagent at pH=5. Various factors affecting complex formation, such as, pH effect, reagent concentration, time effect and temperature effect, have been considered and studied. Under optimum conditions concentration ranged from (5.00-80.00) µg/mL of copper(II) obeyed Beer`s Low. Maximum absorption of the complex was 409nm with molar absorpitivity 0.127x104 L mol-1 cm-1. Limit of detection(LOD) and Limit of quantification were 1.924 and 6.42 μg/mL, respectively.
... Show MoreGas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t
Because of their Physico‐chemical characteristics and its composition, the development of new specific analytical methodologies to determine some highly polar pesticides are required. The reported methods demand long analysis time, expensive instruments and prior extraction of pesticide for detection. The current work presents a new flow injection analysis method combined with indirect photometric detection for the determination of Fosetyl‐Aluminum (Fosetyl‐Al) in commercial formulations, with rapid and highly accurate determination involving only construction of manifold system combined with photometric detector without need some of the pre‐treatments to the sample before the analysis such a
The aim of this study was to evaluate the possibility of using Lactobacillus cells as a probiotic to treat some vaginal infections. For this purpose, thirty Lactobacillus isolates were collected from vaginal samples subjected to a screening program to investigate their antagonism abilities against four vaginosis species: Pseudomonas aeruginosa, Escherichia coli, Klebsiella pneumonia and Proteus spp. Eighteen isolates were selected from the primary screening (agar plug diffusion method) based on their ability to inhibit the growth of 4 indicators which then subjected to a secondary screening program with two methods: detection of bacteriocin activity and
... Show MoreSeveral stress-strain models were used to predict the strengths of steel fiber reinforced concrete, which are distinctive of the material. However, insufficient research has been done on the influence of hybrid fiber combinations (comprising two or more distinct fibers) on the characteristics of concrete. For this reason, the researchers conducted an experimental program to determine the stress-strain relationship of 30 concrete samples reinforced with two distinct fibers (a hybrid of polyvinyl alcohol and steel fibers), with compressive strengths ranging from 40 to 120 MPa. A total of 80% of the experimental results were used to develop a new empirical stress-strain model, which was accomplished through the application of the parti
... Show More