Preferred Language
Articles
/
lhef3ZEBVTCNdQwCSptG
16.15: Experimental evaluation of a novel demountable shear connector for accelerated repair or replacement of precast steel‐concrete composite bridges
...Show More Authors

A novel demountable shear connector for precast steel‐concrete composite bridges is presented. The connector uses high‐strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents slip of bolts within their holes. Moreover, the connector promotes accelerated construction and overcomes typical construction tolerances issues of precast structures. Most importantly, the connector allows bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (i) precast deck panels can be rapidly uplifted and replaced; (ii) connectors can be rapidly removed and replaced; and (iii) steel beams can be replaced, while precast decks and shear connectors can be reused. A series of push‐out tests are conducted to assess the behavior of the connector and quantify the effect of important parameters. The experimental results show shear resistance, stiffness, and slip capacity significantly higher than those of welded shear studs along with superior stiffness and strength against slab uplift. Identical tests reveal negligible scatter in the shear load – slip displacement behavior. A design equation is proposed to predict the shear resistance with absolute error less than 8%.

Crossref
View Publication
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Natural-Convection Phenomenon from a Finned Heated Vertical Tube: Experimental Analysis
...Show More Authors

       In this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Experimental Study For a Laminar Natural Convection Heat Transfer From an Isothermal Heated Square Plate With and Without Circular Hole
...Show More Authors

An experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Simulation and Experimental Investigation of Performance and Flow Behavior for Steam Ejector Refrigeration System
...Show More Authors

The ejector refrigeration system is a desirable choice to reduce energy consumption. A Computational Fluid Dynamics CFD simulation using the ANSYS package was performed to investigate the flow inside the ejector and determine the performance of a small-scale steam ejector. The experimental results showed that at the nozzle throat diameter of 2.6 mm and the evaporator temperature of 10oC, increasing boiler temperature from 110oC to 140oC decreases the entrainment ratio by 66.25%. At the boiler temperature of 120oC, increasing the evaporator temperature from 7.5 to 15 oC increases the entrainment ratio by 65.57%. While at the boiler temperature of 120oC and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Developing a Model to Estimate the Productivity of Ready Mixed Concrete Batch Plant
...Show More Authors

Productivity estimating of ready mixed concrete batch plant is an essential tool for the successful completion of the construction process. It is defined as the output of the system per unit of time. Usually, the actual productivity values of construction equipment in the site are not consistent with the nominal ones. Therefore, it is necessary to make a comprehensive evaluation of the nominal productivity of equipment concerning the effected factors and then re-evaluate them according to the actual values.

In this paper, the forecasting system was employed is an Artificial Intelligence technique (AI). It is represented by Artificial Neural Network (ANN) to establish the predicted model to estimate wet ready mixe

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Degradation of Brilliant Green by Using a bentonite Clay- Based Fe Nano Composite Film as a Heterogeneous Photo- Fenton Catalyst.
...Show More Authors

This paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Theoretical Study of the Energy Flow of a Two Stages Four Generators Adsorption Chiller
...Show More Authors

This work is concerned with a two stages four beds adsorption chiller utilizing activated carbon-methanol adsorption pair that operates on six separated processes. The four beds that act as thermal compressors are powered by a low grade thermal energy in the form of hot water at a temperature range of 65 to 83 °C.  As well as, the water pumps and control cycle consume insignificant electrical power. This adsorption chiller consists of three water cycles. The first water cycle is the driven hot water cycle. The second cycle is the cold water cycle to cool the carbon, which adsorbs the methanol. Finally, the chilled water cycle that is used to overcome the building load. The theoretical results showed that average cycle cooling power

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of the Present Simple: An Experimental Study in the University of Baghdad
...Show More Authors

Some research reports that cognitive grammar (CG) theory has good contributions to teaching English as a foreign language. In this research, the researchers seek to apply this theory and its principles when teaching the simple present tense to Iraqi students who face difficulties in differentiating between the multiple usages of this tense. To achieve this objective, the researchers have conducted an experimental study on a group of 60 Iraqi students in the University of Baghdad, College of Education for Women. Langacker’s (2003) theory has been adopted in the analysis of the cognitive relations to understand the common and different connections of these usages of the simple present. The study has concluded that the cognitive grammar t

... Show More
View Publication Preview PDF
Crossref