This research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab
Fao region is characterized by weak soft silty clay to clayey silt thick layer which extends to a depth of about 20 m. The construction of some structures on such soils may needs piles. During the installation of driven piles, the soil geotechnical properties are exposed to significant changes result due to shearing under large shear strains. These changes significantly decrease the shear strength of the virgin soil due to the destruction of soil structure caused by remolding. The degradation of shear strength is usually followed by strength regaining which is called “Thixotropy”. In this study, the thixotropic effect on Fao clay was investigated. Many disturbed and undisturbed soil samples were brought from Fao regi
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More