A novel demountable shear connector for precast steel-concrete composite bridges is presented. The connector uses high-strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents bolts from slipping within their holes. Moreover, the connector promotes accelerated construction and overcomes the typical construction tolerance issues of precast structures. Most importantly, the connector allows bridge disassembly. Therefore, it can address different bridge deterioration scenarios with minimum disturbance to traffic flow including the following: (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (
... Show MoreThe role of relaxation program for reducing anxiety of patients in dental clinic
Infertility can be detected when the couples have not completed pregnancy after a year or more of normal coitus. So, in order to treat infertility, there are many supported reproductive techniques are in practice. The success rate of these techniques depends upon the way by which preparation of the paternal semen sample. Over the past 30 years, the manual has been standard as providing global standards and has been used extensively by research and clinical laboratories throughout the world. The spermatozoa of all placental (eutherian) mammals, including humans, are in a protective, no labile formal at ejaculation and are incapable of fertilization even if they are placed in direct contact with an oocyte. Accordingly, they must undergo a sub
... Show MoreThe bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about the used weight on bit WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos
... Show MoreA Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine (Arg) and glycine ( Gly) in arginine acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed metho
... Show MoreOne of the main causes for concern is the widespread presence of pharmaceuticals in the environment, which may be harmful to living things. They are often referred to as emerging chemical pollutants in water bodies because they are either still unregulated or undergoing regulation. Pharmaceutical pollution of the environment may have detrimental effects on ecosystem viability, human health, and water quality. In this study, the amount of remaining pharmaceutical compounds in environmental waters was determined using a straightforward review. Pharmaceutical production and consumption have increased due to medical advancements, leading to concerns about their environmental impact and potential harm to living things due to their increa
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreBackground: The denture base inaccuracies during processing negatively influence the retention and stability of finished complete denture. The aims of this study were to evaluate teeth movement and palatal adaptation of autoclave cured denture bases and their relationship with palatal depths and investments. Materials and methods: A nightly maxillary complete dentures prepared, processed and organized to be tested as follows: 1. Processing methods: water bath and autoclave with both fast and slow cycles. 2. Palatal depth: shallow, medium and deep. 3. Investing medium: stone and silicone. For every finished denture, two measurements were done: first: teeth movement by attaching metallic reference screws on the right and left centrals, first
... Show MoreBackground: Lateral cephalometric radiography is commonly used as a standard tool in orthodontic assessment and treatment planning. This study aimed to determine the tongue and surrounding space area in a sample of Iraqi adults with class I dental and skeletal pattern. Materials and methods: The study included thirty healthy subjects (15 males and 15 females) with an age ranged between 23-34 years and class I dental and skeletal pattern with no history of any sleep related disorders. The assessed cephalometric measurement included length and height of the tongue and position of hyoid bone from cervical line. Descriptive statistics were obtained for the data. Genders difference was evaluated by independent sample t-test. Results: There wer
... Show More