This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the deep beam is governed by the size and location of web openings. The experimental results indicated that the reduction of the shear capacity may reach (66%). ABAQUS finite element software program was used for simulation and analysis. Numerical analyses provided un-conservative estimates for deep beam load carrying capacity in the range between (5-21%). However, the maximum scatter of the finite element method predictions for first diagonal and first flexural cracking loads was not exceeding (17%). Also, at service load the numerical of midspan deflection was greater than the experimental values by (9-18%).
This paper reports on the experimental study, which conducted a series of triaxial tests for the asphalt concrete using hydrated lime as a mineral additive. Three HMA mixes, prepared by the specification for wearing, levelling and base layers, were studied under three different temperatures. The test results have demonstrated that, compared with the control mixes excluding HL, the permanent deformation resistance of the HL modified mixes has significant improvement. The deformation has been reduced at the same load repetition number, meanwhile the flow number has been considerably increased. The degree of improvement in permanent deformation resistance using HL is more pronounced at high stress deviation states and high temperature.
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreWe propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.
Two different composite materials were prepared by stir casting method of AA 6061 alloy as a matrix reinforced with two addition different ceramic materials Al2O3 and B4C of grain size 20 µm by 2.5, 5, 7.5 and10% in weight. The composite material with aluminum alloy as a matrix possesses a unique mechanical properties such as: high specific strength and hardness, low density, and high resistance to corrosion and friction wear. This composite is widely used in automotive parts space and marine applications.
Pin-on-disc technique was used to calculate the wear rate for each addition of Al2O3 and B4C particles. Rockwell hardness test and
... Show MoreThe influence of different thickness (500, 1000, 1500, and 2000) nm on the electrical conductivity and Hall effect measurements have been investigated on the films of copper indium gallium selenide CuIn1-xGaxSe2 (CIGS) for x= 0.6.The films were produced using thermal evaporation technique on glass substrates at R.T from (CIGS) alloy. The electrical conductivity (σ), the activation energies (Ea1, Ea2), Hall mobility and the carrier concentration are investigated and calculated as function of thickness. All films contain two types of transport mechanisms of free carriers, and increases films thickness was fond to increase the electrical cAnductivity whereas the activation energy (Ea) would vary with films thickness. Hall Effect analysis resu
... Show MoreAbstract
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search th
... Show MoreA gantry robot is one of the most common types of industrial robots with linear movement. This type of robot is also known as a Cartesian or linear robot. It is an automated industrial system that moves along linear paths, enabling it to create a 3D envelope of the space in which it operates. A robot of this type has a standardised configuration process because it can have several sets of axes, such as X, Y and Z. The gantry robot picks up products from several places, so it can search through various locations. Afterwards, it carefully deposits the products on a conveyor belt for the next stage of the procedure or final shipment. This integration enables continuous and automated material flow
... Show MoreAn optimization study was conducted to determine the optimal operating pressure for the oil and gas separation vessels in the West Qurna 1 oil field. The ASPEN HYSYS software was employed as an effective tool to analyze the optimal pressure for the second and third-stage separators while maintaining a constant operating pressure for the first stage. The analysis involved 10 cases for each separation stage, revealing that the operating pressure of 3.0 Kg/cm2 and 0.7 Kg/cm2 for the second and third stages, respectively, yielded the optimum oil recovery to the flow tank. These pressure set points were selected based on serval factors including API gravity, oil formation volume factor, and gas-oil ratio from the flow tank. To impro
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More