Preferred Language
Articles
/
bBYxKocBVTCNdQwCmzv4
Influence of Fire-Flame Duration and Temperature on the Behavior of Reinforced Concrete Beam Containing Water Absorption Polymer Sphere; Numerical Investigation
...Show More Authors

One of the most important parameters determining structural members' durability and strength is the fire flame's influence and hazard. Some engineers have advocated using advanced analytical models to predict fire spread impact within a compartment and considering finite element models of structural components to estimate the temperatures within a component using heat transfer analysis. This paper presented a numerical simulation for a reinforced concrete beam’s structural response in a case containing Water Absorbing Polymer Spheres (WAPS) subjected to fire flame effect. The commercial finite element package ABAQUS was considered. The relevant geometrical and material parameters of the reinforced concrete beam model at elevated temperature are first suggested as a numerical model. After that, the suggested numerical model was validated against the experimental tests conducted in this study. The validated numerical model was used to conduct a parametric study to investigate the effects of two important parameters on the structural behavior after being exposed to fire flame. The effect of burning temperatures (500, 600, and 700) oC, as well as the influence of fire duration (1 and 2) hours, were included. The experimental program validation requirement comprised four self-compacted reinforced concrete beams each of the same geometric layout (150x200x1500) mm, reinforcing details, and compressive strength (fc'=50 MPa). Four percentages of (WAPS) were considered (0, 1, 2, and 3)%. The specimens were exposed to a fire flame with a steady-state temperature (500°C), a rising rate compatible with ASTM-E119, a one-hour duration, and a sudden cooling procedure. A static (two-point) load was applied to the burned beams. Through the assessed numerical model, the numerical analysis offered by the WAPS ratio effect was carried out for the reinforced concrete beam under the effect of static load. The findings revealed that the WAPS ratio substantially impacted structural behavior. The numerical model's results were in reasonable agreement with the experimental results. Concerning the fire exposure duration (two hours) at 500 oC, the specimens containing a ratio (3%) of WAPS improved the ultimate load and the ultimate deflection by about (46.63 and 72.24)%, respectively. The highest percentage variation of the absorbed energy at failure load was also detected in the ratio (3%) to be (139.43) %. As for the hardening concrete properties (compressive strength, splitting tensile strength, and modulus of elasticity), the residual strength was (61.06, 48.87, and 32.00)%, respectively. Regarding the steady-state burning temperature (500, 600, and 700)oC for a one-hour duration, the specimens with a ratio of (3%) WAPS improved the ultimate load by about (40.70, 62.00, and 40.76)%, respectively, corresponding to zero percentage of WAPS. The residual compressive strength, splitting tensile strength, and modulus of elasticity were (72.40, 56.12, and 43.78)%, (74.36, 56.50, and 44.79)%, and (45.23, 36.57, and 28.94)%, respectively.

Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 30 2008
Journal Name
College Of Islamic Sciences
Achieving the masterpiece of the loved ones for the guided students. Explanation of the Baiquonian system in the hadith of Sheikh Dawood Al-Nasseri
...Show More Authors

A gracious invitation was extended to us on 9/11/2002 AD, by the University of Tikrit / the Preparatory Committee, for a symposium (Sheikh Daoud Al-Tikriti, and his Scientific Effects), to participate in it.
The symposium was scheduled to be held on the 25th and 26th of March 2003 AD, but God Almighty decreed that our country be occupied, so the Preparatory Committee set another date for the symposium on 10/21/2003 AD.
It was not possible for the symposium to be held until 25-26/4/2004 AD, and many researchers attended, who were assigned to investigate some manuscripts of Sheikh Dawood (may God have mercy on him) or to write about his personal and scientific biography.
And God (Glory be to Him) did not enable us to attend, becau

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Fri Jan 07 2022
Journal Name
International Journal Of Early Childhood Special Education
Hierarchical learning and its effect on learning some basic skills in fencing for third stage students.
...Show More Authors

MH Hamzah, AF Abbas, International Journal of Early Childhood Special Education, 2022

View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Ieee Transactions On Network Science And Engineering
A Resource Allocation Mechanism for Cloud Radio Access Network Based on Cell Differentiation and Integration Concept
...Show More Authors

View Publication
Crossref (16)
Crossref
Publication Date
Tue Jun 09 2020
Journal Name
Article In Journal Of Engineering Science And Technology
English Numbers Recognition Based on Sign Language Using Line-Slope Features and PSO-DBN Optimization Method
...Show More Authors

View Publication
Scopus (3)
Scopus
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Physics: Conference Series
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and cubic SVM
...Show More Authors
Abstract<p>Communication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p</p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Passer Journal Of Basic And Applied Sciences
Enhanced Security Taxonomy for Fog-Enabled VANETs: A Comprehensive Survey on Attacks, Challenges, Applications and Architectures
...Show More Authors

Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c

... Show More
View Publication
Scopus (3)
Scopus Crossref