The main objective of this study is to characterize the main factors which may affect the behavior of segmental prestressed concrete beams comprised of multi segments. The 3-D finite element program ABAQUS was utilized. The experimental work was conducted on twelve simply supported segmental prestressed concrete beams divided into three groups depending on the precast segments number. They all had an identical total length of 3150mm, but each had different segment numbers (9, 7, and 5 segments), in other words, different segment lengths. To simulate the genuine fire disasters, nine beams were exposed to high-temperature flame for one hour, the selected temperatures were 300°C (572°F), 500°C (932°F) and 700°C (1292°F) as recommended by ASTM–E119. Four numerical models have been utilized to represent the unburned and the burned specimens at the three elevated temperatures. Calibration and simulation of the experimental work were conducted, while comparisons were made with the experimental results. These included the prestress effect, load-deflection relation under applied load, and load at failure of the reference beam and the beams after the exposure to fire.
The current research aims to adopt production quality decisions as the most important decisions , because they are accompanied by customer satisfaction through monitoring the quality of drinking water in iraq which reach through the pipeline network associated with water treatment projects of Tigris and Euphrates rivers. One of the indicators of quality control was the drawing of the C-chart by specifying the central line and the upper and lower limit of the control and the diagnosis of whether the production system as a whole within the scope of quality control or not and determine the strength and significance of the correlation between the quantities of water And actual needs for customers , the research has reached a number o
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
It is well known that the art of theater is based on multiple elements come in the forefront of Representative and his work, and must be of such a representative of the kits help him to complete his work and take it out the image that aspires to it is team work, and these supplies are in the two main axes:First: Internal supplies which runs from the imagination through the focusing and memory Representative and adapts to situations and positions and others.The second is a foreign supplies, which starts from his words and gestures and his movement and his voice, which is the need to requirements help to maturation and completion of this aspect, including the lighting, costumes, decor, make-up, is the role of make-up theater and its import
... Show Moresolation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency
In this research study failed Annunciation No. 10 for the fourth phase of the pressure of carbon dioxide of the company for Southern Fertilizers and repeated the failures more than once for the same gospel was a detailed study of the gospel included a series tests for properties Mechanical and Structural addition to the tests microscopic and scanning electron microscope shows m This study parameters and a failure Elal well as the existence of an old internal cracks in the metal of the Annunciation
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college