In this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in
In this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in
'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
Due to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.
Municipal solid waste generation in Babylon Governorate is often affected by changes in lifestyles, population growth, social and cultural habits and improved economic conditions. This effect will make it difficult to plan and draw up future plans for solid waste management.In this study, municipal solid waste was divided into residential and commercial solid wastes. Residential solid wastes were represented by household wastes, while commercial solid wastes included commercial, institutional and municipal services wastes.For residential solid wastes, the relational stratified random sampling was implemented, that is the total population should be divided into clusters (socio-income level), a random sample was taken in e
... Show MoreVol. 6, Issue 1 (2025)
In this paper, a computational method for solving optimal problem is presented, using indirect method (spectral methodtechnique) which is based on Boubaker polynomial. By this method the state and the adjoint variables are approximated by Boubaker polynomial with unknown coefficients, thus an optimal control problem is transformed to algebraic equations which can be solved easily, and then the numerical value of the performance index is obtained. Also the operational matrices of differentiation and integration have been deduced for the same polynomial to help solving the problems easier. A numerical example was given to show the applicability and efficiency of the method. Some characteristics of this polynomial which can be used for solvin
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show MoreThe Enhanced Thematic Mapper Plus (ETM+) that loaded onboard the Landsat-7 satellite was launched on 15 April 1999. After 4 years, the image collected by this sensor was greatly impacted by the failure of the system’s Scan Line Corrector (SLC), a radiometry error.The median filter is one of the basic building blocks in many image processing situations. Digital images are often distorted by impulse noise due to errors generated by the noise sensor, errors that occur during the conversion of signals from analog-to-digital, as well as errors generated in communication channels. This error inevitably leads to a change in the intensity of some pixels, while some pixels remain unchanged. To remove impulse noise and improve the quality of the
... Show More