Preferred Language
Articles
/
N4ZwsoYBIXToZYALBbFw
Analysis of structural concrete bar members based on secant stiffness methods
...Show More Authors

In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated through the strain profiles, stress distribution, normal force-axial strain, and moment-curvature relationships, shows that the numerical model has good numerical accuracy and is capable of predicting the behavior of structural concrete members with different partially prestressing ratios at serviceability and ultimate loading stages.

Scopus
Publication Date
Thu Apr 27 2023
Journal Name
Civileng
Numerical Modeling and Analysis of Strengthened Steel–Concrete Composite Beams in Sagging and Hogging Moment Regions
...Show More Authors

Strengthening of composite beams is highly needed to upgrade the capacities of existing beams. The strengthening methods can be classified as active or passive techniques. Therefore, the main purpose of this study is to provide detailed FE simulations for strengthened and unstrengthened steel–concrete composite beams at the sagging and hogging moment regions with and without profiled steel sheeting. The developed models were verified against experimental results from the literature. The verified models were used to present comparisons between the effect of using external post-tensioning and CFRP laminates as strengthening techniques. Applying external post-tensioning at the sagging moment regions is more effective because of the e

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Bridge Engineering
Torsional Analysis of Multicell Concrete Box Girders Strengthened with CFRP Using a Modified Softened Truss Model
...Show More Authors

Scopus (32)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Proposed methods of image recognition depend on the PCA
...Show More Authors

This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Analysis Based on Well Logging Data for Tight Carbonate Reservoir: The SADI Formation Case in Halfaya Oil Field
...Show More Authors

Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 11 2021
Journal Name
Engineering, Technology & Applied Science Research
Experimental and Numerical Analysis of the Punching Shear Resistance Strengthening of Concrete Flat Plates by Steel Collars
...Show More Authors

In this study, six square reinforced concrete flat plates with dimensions of (1500×1500×100) mm were tested under a concentrated load applied on a column located at the center of the slabs. One of these slabs was the control specimen, whereas, in the others, steel angles (steel collars) were used, fixed at the connection region between the slab and the column to investigate the effect of the presence of these collars on punching shear strength. Five thicknesses were used (4, 5, 6, 8, 10mm) with constant legs of angles (75×75) mm of the steel collars to investigate the effects on the punching shear resistance with respect to the control slab. The results of the experimental study show that the punching shear resistance increased b

... Show More
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Mon Mar 30 2020
Journal Name
Neuroquantology
Structural and Optical Analysis of Rhodamine 6G Thin Films Prepared by Q-switched Nd: YAG Pulsed Laser Deposition
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Two Types of Personality and Achievement Motivation among University Teaching Staff Members
...Show More Authors

    Research aimed to:1- Be acquainted to the two types of personality A,B with the members of the teaching staff of Anbar university 2- The level of the motivational achievement among the teaching staff  3- The level of motivational achievement  of the teaching staff  of( A,B). 4- Differences of the abstract implications of A,B type  5- The relationship between A and B and the motivational achievement.

  Research Tools: the researchers  followed  measure  A, B type of  Howard Glaser  1978,and   measure  of Achievement Motivation for Mansoorm1986.

   The Result showed: 1. A tendency of the t

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF