This study aimed at evaluating the torsional capacity of reinforced concrete (RC) beams externally wrapped with fiber reinforced polymer (FRP) materials. An analytical model was described and used as a new computational procedure based on the softened truss model (STM) to predict the torsional behavior of RC beams strengthened with FRP. The proposed analytical model was validated with the existing experimental data for rectangular sections strengthened with FRP materials and considering torque-twist relationship and crack pattern at failure. The confined concrete behavior, in the case of FRP wrapping, was considered in the constitutive laws of concrete in the model. Then, an efficient algorithm was developed in MATLAB environment to accomplish the analysis, solve the appropriate equations, and calculate the torsional moment and angle of twist at all points. The parametric study considered the effect of effective fiber strain to reach a better prediction for the full torsional behavior. The model was able to predict the torsional behavior of the RC beams strengthened with FRP materials before and after cracking stages with reasonable accuracy.
In past years, structural pavement solution has been combined with destructive testing; these destructive methods are being replaced by non-destructive testing methods (NDT). Because the destructive test causes damage due to coring conducted for testing and also the difficulty of adequately repairing the core position in the field. Ultrasonic pulse velocity was used to evaluate the strength and volumetric properties of asphalt concrete, of binder course. The impact of moisture damage and testing temperature on pulse velocity has also been studied. Data were analyzed and modeled. It was found that using non-destructive testing represented by pulse velocity could be useful to predict the quality of asphalt c
... Show MoreThe nucleon momentum distributions (NMD) and elastic electron scattering form factors of the ground state for some 1f-2p-shell nuclei, such as 58Ni, 60Ni, 62Ni, and 64Ni
isotopes have been calculated in the framework of the coherent fluctuation model (CFM) and expressed in terms of the weight function lf(x)l2 . The weight function (fluctuation function) has been related to the nucleon density distribution (NDD) of the nuclei and determined from the theory and experiment. The NDD is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of the l
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreHome New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThis research aims to identify the impact of the selective model in acquiring the concepts of Kurdish grammar among female students in the eighth grade, and to achieve the goal of research, the researcher selected the experimental design with partial control and dimensional testing; the sample includes basic schools in the Chim district of Chamal/ Sulaymaniyah and randomly selected the basic school (Maha Bad) to be the field of application of the experiment and the random drawing method was chosen: two out of three sections and the number of students of the two sections is (75) students; section (C) represents the experimental group that studied the rules according to the selective model and its number is (37) students, while secti
... Show More