Reliability analysis methods are used to evaluate the safety of reinforced concrete structures by evaluating the limit state function 𝑔(𝑋𝑖). For implicit limit state function and nonlinear analysis , an advanced reliability analysis methods are needed. Monte Carlo simulation (MCS) can be used in this case however, as the number of input variables increases, the time required for MCS also increases, making it a time consuming method especially for complex problems with implicit performance functions. In such cases, MCS-based FORM (First Order Reliability Method) and Artificial Neural Network-based FORM (ANN FORM) have been proposed as alternatives. However, it is important to note that both MCS-FORM and ANN-FORM can also be time-consuming methods in their own right. MCS-FORM involves running multiple MCS, and the time required increases with problem complexity and desired precision. ANN-FORM, on the other hand, can be faster for repetitive reliability assessments, but the training phase can be computationally expensive, and accuracy depends on training data quality and quantity. To address this computational challenge and enhance the efficiency of reliability analysis, a novel method is proposed in this paper. This method leverages the capabilities of ABAQUS, in combination with MATLAB. The key objective of this proposed approach is to automate and streamline the repetitive tasks involved in reliability analysis, thereby significantly reducing the computational time required for such analyses. The method is based on the development of a custom ABAQUS Python script file, which interfaces with MATLAB. The script serves as a bridge between the finite element analysis capabilities of ABAQUS and the data processing and analysis capabilities of MATLAB. An illustrative example was considered to demonstrate the application of the proposed method. In this example, a deteriorated simply supported concrete beam with an implicit performance function was analysed. The objective was to assess the reliability of the beam under the given conditions. To perform this reliability analysis, the two methods were employed: MCS-FORM and ANN-FORM. Both of these methods were implemented in conjunction with the newly developed approach that integrates ABAQUS and MATLAB. The results of this analysis were quite promising. Both MCS-FORM and ANN-FORM successfully estimated the reliability of the concrete beam, and they exhibited a high level of agreement in their assessments. This presented method demonstrates its suitability for the application of reliability analysis in scenarios such as the one presented. Its efficiency in automating repetitive tasks not only simplifies the analysis process but also facilitates the generation of multiple simulations. By doing so, it significantly minimizes the time and computational resources required for reliability assessments.
This piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreBackground. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreAt the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More