Preferred Language
Articles
/
SIbPtoYBIXToZYALurMC
Residual post fire strength of non-prismatic perforated beams
...Show More Authors
Abstract<p>The main aim of this study is to assess the performance and residual strength of post-fire non-prismatic reinforced concrete beams (NPRC) with and without openings. To do this, nine beams were cast and divided into three major groupings. These groups were classified based on the degrees of heating exposure temperature chosen (ambient, 400, and 700°C), with each group containing three non-prismatic beams (solid, 8 trapezoidal openings, and 8 circular openings). Experimentally, given the same beam geometry, increasing burning temperature caused degradation in NPRC beams, which was reflected in increased mid-span deflection throughout the fire exposure period and also residual deflection after cooling. But on the other hand, the issue with existing openings was exacerbated. The burned NPRC beams were then gradually cooled down by leaving them at ambient temperature in the laboratory, and the beams were loaded until failure to examine the effect of burning temperature degree on the residual ultimate load-carrying capacity of each beam by comparing them to unburned reference beams. It was found, increasing the exposure temperature leads to a reduction in ultimate strength about (5.7 and 10.84%) for solid NPRC beams exposed to 400 and 700°C, respectively related to unburned one, (21.13 -32.8) % for NPRC beams with eight trapezoidal openings, and (10.5 - 12.8) % for those having 8 circular openings. At higher loading stage the longitudinal compressive strain of Group ambient in mid-span of solid beams reach 2700 με, while the others with openings exhibit divergent strain higher than that, it’s about 3300 με meanwhile, the lower chord main reinforcements have been pass beyond yielding stress. Exposure to high temperatures reduces rafters’ stiffness causing a reduction in load carrying capacity, companion with premature failure consequently reduce the strain at the ultimate stage.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Non-deterministic Approach for Reliability Evaluation of Steel Beam
...Show More Authors

This paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has be

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 07 2016
Journal Name
Journal Of The Faculty Of Medicine
Non discogenic lumbar radiculopathy ((A study of 104 cases))
...Show More Authors

AW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1

View Publication
Publication Date
Fri Jul 26 2019
Journal Name
Dental Materials Journal
Semi-interpenetrating network composites reinforced with Kevlar fibers for dental post fabrication
...Show More Authors

View Publication
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
The technical and conceptional changing in post modern art: شيماء وهيب خضير
...Show More Authors

The art has been turned its subject in the post modern thinking . this turning is aresult to the turning in the role of the art it self. Across its history the art was basing its subject on a universal unite it the phenomenenon which is the most elevated . that the artist try to activate the role of the subject as a axial which compose the plastic art them. Because of the history of art full with subjects which consider in alarg part of it, have relation ship with elite and aesthetics , and from the begening of renaissance the central activity of the art was based on opoint which has concentrated reaction or it going in away belong to the state in that time.so renaissance was in relegous axial and romantisim on a dream axial, classisisim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 03 2010
Journal Name
Journal Of Educational And Psychological Researches
Post Traumatic Stress Disorder (PTSD) among Iraqi Intellectual Immigrants after Occupation 2003.
...Show More Authors

These factors, as well as disasters and wars that the Arab homeland exposed to and still under this exposure, in addition to the severe stress upon.

Iraqi Academics have been subjected to direct consequences of 2003 war. Exact figures are not known. It was mentioned. Many people were killed, sacked from their academics jobs, threatened to leave directly or indirectly their jobs, houses, and Iraq. Others have been imprisoned, tortured, or kidnapped / threatened to be kidnapped etc. Their families have been subjected to similar traumatic experiences or threats. All theses stressors may have lead to Post Traumatic (PTSD) Experiences. These Traumatic experiences have lead to Dislocation, relocation and Immigration etc. All sectors of

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 20 2025
Journal Name
Journal Of Physical Education
Exercises With Different Ranges Of Motion With Significance Of Electrical Activity for Muscle in Strength With Speed Of Lower Limbs For Weight Lifters Of Physical Strength
...Show More Authors

View Publication
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
Le professeur Taranne et La non-Communication
...Show More Authors

Le professeur Taranne et La non-Communication

View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref