Preferred Language
Articles
/
kBizZ5UBVTCNdQwC9S0d
Simulation and design model for reinforced concrete slabs with lacing systems
...Show More Authors

Lacing reinforcement plays a critical role in the design and performance of reinforced concrete (RC) slabs by distributing the applied loads more evenly across the slab, ensuring that no specific area of the slab is overloaded. In this study, nine slabs, divided into three groups according to the investigated parameters, were meticulously designed and evaluated to study the interplay between the lacing reinforcement and other key parameters. Each slab was crafted for simple support and was subjected to both static and repeated two-point load tests. The lacing reinforcement had an angle of 45° with various tension and lacing steel. The repeated-tested specimens with lacing reinforcement experienced smaller ductility than those of similar static-tested specimens, where the reduction in ductility factor ranged between 8.4% and 22.3% for all specimens. Additionally, the tested slabs were analyzed numerically using the ABAQUS software package. The validated FE test program was used to study the effect of varying the lacing reinforcement ratio, the compressive strength of concrete, and the material types of the tension and lacing reinforcements. The lacing reinforcement becomes more effective in increasing the slab capacity when using the higher compressive strength of concrete.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Structures
Behaviour and design of the ‘lockbolt’ demountable shear connector for sustainable steel-concrete composite structures
...Show More Authors

In order to promote sustainable steel-concrete composite structures, special shear connectors that can facilitate deconstruction are needed. A lockbolt demountable shear connector (LB-DSC), including a grout-filled steel tube embedded in the concrete slab and fastened to a geometrically compatible partial-thread bolt, which is bolted on the steel section's top flange of a composite beam, was proposed. The main drawback of previous similar demountable bolts is the sudden slip of the bolt inside its hole. This bolt has a locked conical seat lug that is secured inside a predrilled compatible counter-sunk hole in the steel section's flange to provide a non-slip bolt-flange connection. Deconstruction is achieved by demounting the tube from the t

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2006
Journal Name
Journal Of Engineering
Theoretical Simulation Of Stress-Strain Relations For Some Iraqiclays Using The Endochronic Model
...Show More Authors

Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Design a supply chain model for Baghdad Soft Drinks Company
...Show More Authors

In this paper, a mathematical model was built for the supply chain to reduce production, inventory, and transportation in Baghdad Company for Soft Drink. The linear programming method was used to solve this mathematical model. We reduced the cost of production by reduced the daily work hours, the company do not need the overtime hours to work at the same levels of production, and the costs of storage in the company's warehouses and agents' stores have been reduced by making use of the stock correctly, which guarantees reducing costs and preserving products from damage. The units transferred from the company were equal to the units demanded by the agents. The company's mathematical model also achieved profits by (84,663,769) by re

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Robust Circular S and Circular Least Squares Estimators for Circular Regression Model using Simulation
...Show More Authors

In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the

... Show More
View Publication
Crossref
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 15 2024
Journal Name
Civileng
Structural Performance of a Hollow-Core Square Concrete Column Longitudinally Reinforced with GFRP Bars under Concentric Load
...Show More Authors

Concrete columns with hollow-core sections find widespread application owing to their excellent structural efficiency and efficient material utilization. However, corrosion poses a challenge in concrete buildings with steel reinforcement. This paper explores the possibility of using glass fiber-reinforced polymer (GFRP) reinforcement as a non-corrosive and economically viable substitute for steel reinforcement in short square hollow concrete columns. Twelve hollow short columns were meticulously prepared in the laboratory experiments and subjected to pure axial compressive loads until failure. All columns featured a hollow square section with exterior dimensions of (180 × 180) mm and 900 mm height. The columns were categorized into

... Show More
View Publication
Scopus (9)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
Design and Analysis of BIMD Double Clad MMF -MZI Using Optiwave Simulation
...Show More Authors

This work focused on principle of higher order mode excitation using in- line Double Clad Multi-Mode Mach-Zehnder Interferometer (DC-MM-MZI). The DC-MM-MZI was designed with 50 cm etched MMF. The etching length is 5cm. The tenability of this interferometer was studied using opt grating ver.4.2.2 and optiwave
ver. 7 simulator. After removing (25, 35, 45, 55) μm from MMF and immersing this segment of MMF with water bath contained distilled water and ethanol, in addition to, air. Pulsed laser source  centered at 1546.7nm ,pulse width 10ns and peak power 1.33mW was propagated via this interferometer Maximum modes were obtained in case of air surrounded media which are 9800 and 25 um removed cladding layer, with peak power 49.800 m

... Show More
View Publication Preview PDF