The provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were: number of web openings, the method used to strengthen the member at openings and the height of drop during impact tests. All beams were simply supported with load applied at mid – span. Static results indicated that T-beams with four and six un-strengthened web circular openings whose diameter is 48% of the web depth have strength capacities less than those without openings by 30% and 41%, respectively. However, strengthening of webs results in an increase in the strength capacities ranging between 27% and 92%, depending on the type of strengthening. Impact results indicated that the beam with four openings did not show a remarkable increase in the maximum mid-span deflection compared with the solid beam, while that with six openings showed an increase in the maximum mid-span deflections by about 75% greater than the maximum mid-span deflection of the solid beam. Strengthening of specimens could overcome the increase in deflections.
Abstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar
... Show MoreThis research discusses the verbal follow phenomenon in Al-Amali Abi Al-Qali’s book (seq.356 Hijri). It aims to limit the examples of this phenomenon in the book, and examine it phonologically. Accordingly, the researcher adopted the analaytical descriptive approach, taking into account Al-Rawi’s letter when ordering the verbal follow-based examples, and the order they took in the book in question. The purposes behind this phonological study of verbal follow in Al-Amali’s book are to: reach the sounds which Arabs prefer in the process of following, confirm different beautiful and desirable senses, have easy and speedy pronunciation, maintain harmony between adjacent sounds, count the sounds that occur at the beginning of the
... Show MoreRuthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated
... Show MoreThe research aims to monitor the methods of Counter psychological warfare in the Iraqi press during the operations to liberate Mosul from the control of the terrorist organization ISIS.The research used the survey method, and “Tareek Al Shaab” Newspaper as a research sample, chosen according to the systematic random sample.
The research reached the following results:
1- The Communicator’s relied on the contents of the counter-psychological warfare and its methods in the battle of “Qadimun Ya Naynawa” used in the newspaper. The methods used were labels assigning such as : inevitable victory, prodding and morale, consensus, breaking of opposition morale, stereotyping, demonization of the opponent
Argumentation is not a contemporary, yet a deep rooted intellectual phenomenon dates back to Romans and Greeks times. The argumentative elements ,the author is trying to convey to the reader, are linguistic procedures aim at persuading and being persuaded of what is true. The present study traces, through Camus’ novel The plague, the best method to construct argumentative techniques used to express the author’s deep philosophies.
Résumé
L’argumentation n’est pas un phénomène intellectuel nouveau, ses origines reviennent aux savants grecs et romains. Elle est une act
... Show MoreThe present paper focuses on examining the style of both the civilized dialogue of Prophet Hud (PBUH) in the Glorious Qur'an, and the debated dialogue of Aad’s people. The study consists of an introduction which shows the importance of the civilized dialogue and its significant impact on containing, accepting, and persuading the other in peaceful ways without intolerance and violence. Then, the conditions and techniques of the civilized dialogue and its types have been mentioned. This is followed by the practical side of the study, which involves examining stylistically the techniques used in Hud’s (PBUH) civilized dialogue to be invested later in people’s future conversations. It is also concerned with investigating stylistically
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThe present study was carried to evaluate antibacterial activity of Acetone, Alcholic (cold and hot) and Aqueaus(water) extracts of Citrus aurantifoliaseeds,against growth of some bacteria isolated from burns infections(Pseudomonas aeruginosa,Escherichia coli, Klebsiellapneumonia,Staphylococcusaureus)fromKindy HospitalIn Baghdad from March to June 2012.Antibiotic Sensitivity was done for all isolated bacteria used in this study.Results showed variation in antibacterial activity of different extracts against all tested bacteria by well diffusion technique in agar and measuring the diameter of inhibition zone, at concentration 250Mg-ml. Acetone extract had the greatest inhibitory effect followed by hot alcoholci extract, and then cold alcohol
... Show More