Preferred Language
Articles
/
fxYcFIcBVTCNdQwCNzT8
Flexural Performance of a Novel Steel Cold-Formed Beam–PSSDB Slab Composite System Filled with Concrete Material
...Show More Authors

In this study, the flexural performance of a new composite beam–slab system filled with concrete material was investigated, where this system was mainly prepared from lightweight cold-formed steel sections of a beam and a deck slab for carrying heavy floor loads as another concept of a conventional composite system with a lower cost impact. For this purpose, seven samples of a profile steel sheet–dry board deck slab (PSSDB/PDS) carried by a steel cold-formed C-purlins beam (CB) were prepared and named “composite CBPDS specimen”, which were tested under a static bending load. Specifically, the effects of the profile steel sheet (PSS) direction (parallel or perpendicular to the span of the specimen) using different C-purlins configurations (double sections connected face-to-face, double separate sections, and a single section) were investigated. The research discussed the specimens’ failure modes, flexural behavior, bending capacity, bending strain relationships, and energy absorption index of specimens. Generally, the CBPDS specimens with the PSS slab placed in a parallel direction achieved approximately a 13–40% higher bending capacity compared with the corresponding specimens with a perpendicular PSS direction (depending on the configuration of the beam). Fabricating the beam of the CBPDS specimen with double C-purlins (face-to-face) led to more effective concrete confinement behavior compared with the double separate C-purlins beam. The related specimen recorded a 10% higher bending capacity. Finally, the suggested composite CBPDS system exhibited a sufficient energy absorption capability of the static bending load because it demonstrated high strength and high ductility.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Mar 26 2024
Journal Name
World Electric Vehicle Journal
Fast Finite-Time Composite Controller for Vehicle Steer-by-Wire Systems with Communication Delays
...Show More Authors

The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Numerical Investigation of Natural Convection Heat Transfer in Partially Filled Porous Enclosure Subjected to Constant Heat
...Show More Authors

Steady natural convection in a square enclosure with wall length (L= 20 cm) partially filled by saturated porous medium with same fluid (lower layer) and air (upper layer) is investigated. The conceptual study of the achievements of the heat transfer is performed under effects of bottom heating by constant heat flux (q=150,300,450,600W/m2 ) for three heaters size (0.2,0.14,0.07)m with symmetrically cooling with constant temperature on two vertical walls and adiabatic top wall. The relevant filled studied parameters are four different porous medium heights (Hp=0.25L,0.5L, 0.75L, L), Darcey number (Da1) 3.025×10-8 and (Da2) 8.852×10-4 ) and Rayleigh number range (60.354 - 241.41), (1.304×106 – 5.2166×106 ) for Da1 and Da2 cases respecti

... Show More
Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Investigation of Nonlinear Optical Characteristics of the Multi-Wall Carbon Nanotubes (MWCNT's) Suspensions using Nonlinear Self-Diffraction of a Laser Beam
...Show More Authors

Nonlinear diffraction patterns can be obtained by focusing a laser beam through a thin slice of the material. Here, we investigated experimentally the formation of the far field nonlinear diffraction patterns of cw laser beam at 532 nm passing through a quartz cuvette containing multi-wall carbon nanotubes (MWCNT's) suspended in acetone and in DI water at concentrations of 0.030.wt.%, 0.045 wt.%, 0.060 wt.%, and 0.075 wt.%. Our results show that increasing the concentration of both types of suspensions (MWCNTs in acetone and MWCNTs DI water) led to increase in the number of pattern rings which indicates an increase in their nonlinear refractive indices. Moreover, MWCNTs DI water suspension at a concentration of 0.075 wt. % was more effic

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref