The present study deals with the optimum design of self supporting steel communication towers. A special technique is used to represent the tower as an equivalent hollow tapered beam with variable cross section. Then this method is employed to find the best layout of the tower among prespecified configurations. The formulation of the problem is applied to four types of tower layout
with K and X brace, with equal and unequal panels. The objective function is the total weight of the tower. The variables are the base and the top dimensions, the number of panels for the tower and member's cross section areas. The formulations of design constraints are based on the requirements of EIA and ANSI codes for allowable stresses in the members and the allowable displacement at
antenna position. The Sequential Unconstrained Minimization Technique (SUMT) is used to perform the process. Direct stiffness method is used for the analysis of the structure, with beam elements. The strain energy is used to derive the stiffness matrix for members of unsymmetrical cross section. A computer program in FORTRAN is developed to represent the tower as an equivalent beam, and generate the tower nodes and members, analysis, design and to find the optimum design. Four types of tower are studied with different load cases. The effects of earthquake and wind loadings are taken in two directions and two positions of antenna are considered in the process to seek the optimum design. The tower type of X-brace with unequal panels has the minimum weight
compared with other types of tower and the optimum design is satisfied when the angle of main leg is equal to (87O).
In this work, strains and dynamic crack growth were studied and analyzed in thin flat plate with a surface crack at the center, subjected to cycling low velocity impact loading for two types of aluminum plates (2024, 6061). Experimental and numerical methods were implemented to achieve this research. Numerical analysis using program (ANSYS11-APDL) based on finite element method used to analysis the strains with respect to time at crack tip and then find the velocity of the crack growth under cycling impact loading. In the experimental work, a rig was designed and manufactured to applying the cycling impact loading on the cracked specimens. The grid points was screened in front of the crack tip to measure the elastic-plas
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreTwo dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac
... Show MoreBN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreBackground: Maxillary canines are important aesthetically and functionally, but impacted canines are more difficult and time consuming to treat, the aim of this study is to investigate with multi-detector computed tomography the correlation between the bone density and the upper canine impaction. Material and method: A sample of Unilaterally impacted maxillary canines from 24 patients (19 female, 5 male) who were referred to accurately localize the impacted canines at al- Karkh general hospital were evaluated by a volumetric 3-d images by the multi-detector computed tomography to accurately measure the bone density of the maxillary cortical palate of the maxillary impacted canine side and compare it with the other side of the normally erupt
... Show MoreCongenital adrenal hyperplasia is a group of autosomal recessive disorders. The most frequent one is 21-hydroxylase deficiency. Analyzing
The main objective of this research is to find out the effect of deviation in the aggregate gradients of asphalt mixtures from the Job Mix Formula (JMF) on the general mixture performance. Three road layers were worked on (wearing layer, binder layer, and base layer) and statistical analysis was performed for the data of completed projects in Baghdad city, and the sieve that carried the largest number of deviations for each layer was identified. No.8 sieve (2.36mm), No.50 sieve (0.3mm), and 3/8'' sieve (9.5mm) had the largest number of deviations in the wearing layer, the binder layer, and the base layer respectively. After that, a mixture called Mix 1, was made. This mixture was selected from a number of completed mixtures, and it
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show More