This research presents an experimental investigation of the rehabilitation efficiency of the damaged hybrid reinforced concrete beams with openings in the shear region. The study investigates the difference in retrofitting ability of hybrid beams compared to traditional beams and the effect of two openings compared with one opening equalized to two holes in the area. Five RC beams classified into two groups, A and B, were primarily tested to full-failure under two-point loads. The first group (A) contained beams with normal weight concrete. The second group (hybrid) included beams with lightweight concrete for web and bottom flange, whereas the top flange was made from normal concrete. Two types of openings were considered in this study, rectangular, with dimensions of 100×200 mm, and two square openings with a side dimension of 100 mm. A full wrapping configuration system for the shear region (failure zone) was adopted in this research. Based on the test results, the repaired beams managed to recover their load carrying capacity, stiffness, and structural performance in different degrees. The normal concrete beam regains its total capacity for all types of openings, while the hybrid beams gain 84% of their strength. The strength of hybrid concrete members compared with normal concrete is 81 and 88% for beams of one opening and two openings, respectively. Doi: 10.28991/CEJ-2022-08-01-012 Full Text: PDF
Many attempts have been made to modify the surface of orthodontic micro-implants and prevent the development of microbes by coating them with antimicrobial nanoparticles (NPs). The purpose of the present study was to evaluate the cytotoxicity of different NPs, namely, TiO2 and zinc oxide (ZnO) NPs, that are used to coat titanium orthodontic micro-implants.
Thirty orthodontic micro-implants were included in this study. Those were divided into three groups: control group without coating, TiO2-coated orthodontic micro-implants, and TiO2- and ZnO-coated orthodontic micro-implants. Scann
Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs a
... Show MoreThe isolation and characterization of
The Asymmetrical Castellated concavely – curved soffit Steel Beams with RPC and Lacing Reinforcement improves compactness and local buckling (web and flange local buckling), vertical shear strength at gross section (web crippling and web yielding at the fillet), and net section ( net vertical shear strength proportioned between the top and bottom tees relative to their areas (Yielding)), horizontal shear strength in web post (Yielding), web post-buckling strength, overall beam flexure strength, tee Vierendeel bending moment and lateral-torsional buckling, as a result of steel section encasement. This study presents two concentrated loads test results for seven specimens Asymmetrical Castellated concavely – curved soffit Steel Be
... Show MoreThis manuscript investigated the effect of anchorage CFRP wrapping sheets, bolts, and laminate interlock on increasing the efficiency of flexural strengthening for the post-tension girder using CFRP composites techniques longitudinal laminates at the soffit for partially damaged loss of about 14.3% from its area of prestressed concrete beams, and the impact on restoring the original flexural capacity of PC girder. Mitigating delamination of the soffit of horizontal laminates (CFRP). The texture of the laminate and anchorages influenced the stress of the laminate carbon fiber, the mode of crack propagation and failure, and consequently, the beam's attitude has been investigated in this manuscript. The experimental findi
... Show MoreBackground: Errors of horizontal condylar inclinations and Bennett angles had largely affected the articulation of teeth and the pathways of cusps. The aim of this study was to estimate and compare between the horizontal condylar (protrusive) angles and Bennett angles of full mouth rehabilitation patients using two different articulator systems. Materials and Methods: Protrusive angles and Bennett angles of 50 adult males and females Iraqi TMD-free full mouth rehabilitation patients were estimated by using two different articulator systems. Arbitrary hinge axis location followed by protrusive angles and Bennett angles, estimation was done by a semiadjustable articulator system. A fully adjustable articulator system was utilized to locate th
... Show MoreThis paper presents a numerical analysis of the piled-raft foundation (PRF) based on the actual behavior of supporting piles. The raft was modeled as a thin plate, while the piles were modeled as springs in different ways. This research also aims to propose an analytical model of piles based on actual behavior at fieldwork. The results proved that the structural behavior of raft member can be improved through utilizing the actual behavior of supporting piles. When the piles were modeled as non-linear stiffness springs, settlements and bending stresses of raft foundation were reduce marginally as compared with those obtained from piles with linear stiffness springs.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More