This study aimed to investigate the influence of longitudinal steel embedded tubes located at the center of the column cross-section on the behavior of reinforced concrete (RC) columns. The experimental program consisted of 8 testing pin-ended square sectional columns of 150×150 mm, having a total height of 1400 mm, subjected to eccentric load. The considered variables were the steel square tube sizes of 25, 51 and 68 mm side dimensions and the load eccentricity (50 and 150) mm. RC columns were concealed steel tubes with hollow ratios of 3%, 12% and 20% depending on tube sizes used. The experimental results indicated an improvement in the overall behavior of eccentric columns when steel embedded tubes are used. The maximum gain in
... Show MoreThis study deals with the serviceability of reinforced concrete solid and perforated rafters with openings of different shapes and sizes based on an experimental study that includes 12 post-fire non-prismatic reinforced concrete beams (solid and perforated). Three groups were formed based on heating temperature (room temperature, 400 °C, and 700 °C), each group consisting of four rafters (solid, rafters with 6 and 8 trapezoidal openings, and rafter with eight circular openings) under static loading. A developed unified calculation technique for deflection and crack widths under static loading at the service stage has been provided, which comprises non-prismatic beams with or without opening exposed to flexure concentra
... Show MoreBackground: with the advent of new postmaterial in dentistry, it has become important to measure fitness of post restoration along the horizontal plane of the root space.This study aimed to measure and compare, the cement film thickness of conventional zinc phosphate cement in micrometer between the post and root dentin along horizontal plane at different post space regions (coronal, middle and apical) of four types of posts, by using stereomicroscopy. Material and methods: Thirty-two extracted human maxillary canines, mandibular canines and maxillary central incisors (n=32) were instrumented with ProTaper system files (hand use) and obturated with gutta-percha for ProTaper and AH26® root canal sealer. After 24hrs of incubation at 37ºC, p
... Show MoreAl2O3 and Al2O3–Al composite coatings were deposited on steel specimens using Oxy-acetylene gas thermal spray gun. Alumina was mixed with Aluminum in six groups of concentrations (0, 5, 10,12,15 and 20% ) Al2O3, Specimens were tested for corrosion using Potentiodynamic polarization technique. Further tests were conducted for the effect of temperature on polarization curve and the hardness tests for the coated specimens. At first, Modelling was carried out using MINITAB-19, least square method, as a 2nd degree nonlinear model, bad results were achieved because of the high nonlinearity. Better result w
Background Many countries recommend the use of long-acting reversible contraceptive intrauterine device immediately after cesarean delivery. The cesarean delivery rate in Iraqi public hospitals is 32.2% and may reach 85.8% in private hospitals. Immediate post-partum intrauterine device insertion at cesarean is rarely done in Iraq. Objectives To assess the safety and practicality of immediate post-partum intrauterine device insertion during cesarean delivery for family planning and pregnancy spacing in Iraqi women. Subjects and Methods A single arm clinical trial included 150 eligible women who attended Al-Elwiyah Maternity Teaching Hospital or Al Hayat Rahibat Hospital for term delivery. A copper intrauterine device was placed in the ute
... Show More
The advertising mail is considered as one of potential tools that followed to transfer the printed messages to the consumers and public customers whom are located at homes or works. This type of advertising is preferable due to the zero expense to receive the announcements of products, which became recently one of the successful procedures to create new customers and keep them in touch with direct communication. It is also possible to send them to specific group of people who can be classified by the advertisers to select even by name their own clients to give the personality to the clients for a long term of communication.
&
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreIn this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.