This study aimed at evaluating the torsional capacity of reinforced concrete (RC) beams externally wrapped with fiber reinforced polymer (FRP) materials. An analytical model was described and used as a new computational procedure based on the softened truss model (STM) to predict the torsional behavior of RC beams strengthened with FRP. The proposed analytical model was validated with the existing experimental data for rectangular sections strengthened with FRP materials and considering torque-twist relationship and crack pattern at failure. The confined concrete behavior, in the case of FRP wrapping, was considered in the constitutive laws of concrete in the model. Then, an efficient algorithm was developed in MATLAB environment to accomplish the analysis, solve the appropriate equations, and calculate the torsional moment and angle of twist at all points. The parametric study considered the effect of effective fiber strain to reach a better prediction for the full torsional behavior. The model was able to predict the torsional behavior of the RC beams strengthened with FRP materials before and after cracking stages with reasonable accuracy.
God Almighty put in his great book secrets that do not end, and wonders that do not expire, for he is the one from which the scholars are not satisfied, and he does not create due to the multitude of response, and it is the comprehensive and inhibitory book that God conceals to the worlds, and he challenged the two heavyweights to come up with something like it.
At all times, issues arise in the Noble Qur’an that fit the needs of the people of that time and their culture, for it is an eternal book, characterized by the ability to give, extend and respond to addressing the problems of the age and its variables, when the Arabs had little luck at the time of the message’s descent from the scientific culture, and their proficienc
... Show MoreMost of the studies conducted in the past decades focused on the effect of interest rates and exchange rates on domestic investment under the assumption that the independent variables have the same effect on the dependent variable, but there were limited studies that investigated the unequal effects of changes in interest rates and exchange rates, both positive and negative, on domestic investment. This study used a nonlinear autoregressive distributed lag (NARDL) model to assess the unequal effects of the real interest rate and real exchange rate variables on domestic investment in Egypt for the period 1976 - 2020. The results revealed that positive and negative shocks for both exchange rates have unequal effects on
... Show MoreThe present study aims at identifying the effect of Renzulli model on achievement and holistic thinking among the fifth grade students in the Holy Quran and Islamic Education. The experimental method with partial control was used, and the sample was chosen randomly. The sample consisted of (62) students distributed into experimental and control groups. 164 behavioral goals were formulated based on Bloom's first three levels taxonomy (knowledge and comprehension, application, analysis and installation, and evaluation). The researchers designed a post-test to measure the achievement of students in the subject of Holy Quran and Islamic Education which consisted of (40) objective items and a measure of holistic thinking which consisted of (3
... Show MoreThe Khabour reservoir, Ordovician, Lower Paleozoic, Akkas gas field which is considered one of the main sandstone reservoirs in the west of Iraq. Researchers face difficulties in recognizing sandstone reservoirs since they are virtually always tight and heterogeneous. This paper is associated with the geological modeling of a gas-bearing reservoir that containing condensate appears while production when bottom hole pressure declines below the dew point. By defining the lithology and evaluating the petrophysical parameters of this complicated reservoir, a geological model for the reservoir is being built by using CMG BUILDER software (GEM tool) to create a static model. The petrophysical properties of a reservoir were computed using
... Show MoreThis paper analyzes the effect of scaling-up model and acceleration history on seismic response of closed-ended pipe pile using a finite element modeling approach and the findings of 1 g shaking table tests of a pile embedded in dry and saturated soils. A number of scaling laws were used to create the numerical modeling according to the data obtained from 1 g shake table tests performed in the laboratory. The current study found that the behaviors of the scaled models, in general have similar trends. From numerical modeling on both the dry and saturated sands, the normalized lateral displacement, bending moment, and vertical displacement of piles with scale factors of 2 and 35 are less than those of the pile with a scale factor of 1 and the
... Show MoreAbstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show More