The present study focused mainly on the analysis of stiffened and unstiffened composite laminated plates subjected to buckling load. Analytical, numerical and experimental analysis for different cases has been considered. The experimental investigation is to manufacture the laminates and to find mechanical properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus. The compressive test was carried to find the critical buckling load of plate. The design parameters of the laminates such as aspect ratio, thickness ratio, boundary conditions and number of stiffeners were investigated using high order shear deformation theory (HOST) and Finite element coded by ANSYS .The main conclusion was the buckling load could increase and decrease depending on the boundary conditions, thickness ratio, and, the aspect ratio and number of stiffeners of the plate.
This paper studies the effect of mean wind velocity on tall building. Wind velocity, wind profile and wind pressure have been considered as a deterministic phenomenon. Wind velocity has been modelled as a half-sinusoidal wave. Three exposures have been studied B, C, and D. Wind pressure was evaluated by equation that joined wind pressure with mean wind velocity, air density, and drag coefficient.
Variations of dynamic load factor for building tip displacement and building base shear were studied for different building heights, different mode shapes, different terrain exposures, and different aspect ratios of building plan. SAP software, has been used in modelling and dynamic analysis for all case studies.
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn this work, the effect of preparing a composite of copper oxide nanoparticles with carbon on some of its optical properties was studied. The composite preparing process was carried out by exploding graphite electrodes in an aqueous suspension of copper oxide. The properties of the plasma which is formed during the explosion were studied using emission spectroscopy in order to determine the most important elements that are present in the media. The electron’s density and their energy, which is the main factor in the composite process, were determined. The particle properties were studied before and after the exploding process. The XRD showed an additional peak in the copper oxides pattern corresponding to the hexagonal graphite struct
... Show MoreTo enhance the structural performance of concrete-filled steel tube (CFST) columns, various strengthening techniques have been proposed, including the use of internal steel stiffeners, external wrapping with carbon fiber-reinforced polymer (CFRP) sheets, and embedded steel elements. However, the behavior of concrete-filled stainless-steel tube (CFSST) columns remains insufficiently explored. This study numerically investigates the axial performance of square CFSST columns internally strengthened with embedded I-section steel profiles under biaxial eccentric loading. Finite element (FE) simulations were conducted using ABAQUS v. 6.2, and the developed models were validated against experimental results from the literature. A comprehen
... Show MoreA novel demountable shear connector for precast steel-concrete composite bridges is presented. The connector uses high-strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents bolts from slipping within their holes. Moreover, the connector promotes accelerated construction and overcomes the typical construction tolerance issues of precast structures. Most importantly, the connector allows bridge disassembly. Therefore, it can address different bridge deterioration scenarios with minimum disturbance to traffic flow including the following: (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (
... Show MoreThis research dealt with the analysis of murder crime data in Iraq in its temporal and spatial dimensions, then it focused on building a new model with an algorithm that combines the characteristics associated with time and spatial series so that this model can predict more accurately than other models by comparing them with this model, which we called the Combined Regression model (CR), which consists of merging two models, the time series regression model with the spatial regression model, and making them one model that can analyze data in its temporal and spatial dimensions. Several models were used for comparison with the integrated model, namely Multiple Linear Regression (MLR), Decision Tree Regression (DTR), Random Forest Reg
... Show MoreThe study was performed to analyze the oropharynx airway and examine the influence of age and gender on the oropharynx volume configuration using cone beam computed tomography.
This study examined the cone beam computed tomographic images of 51 patients 25 male and 26 females, group matched for age and gender. The oropharynx airway volume and area between the posterior nasal spine and top of the epiglottis were measured and compared.
Background: This study designed to shade light on the important role of CBCT in accurate localization of the impacted maxillary canines. Materials and method: Fifty two unilateral and bilateral impacted maxillary canines from 30 patients (24 females and 6 males) were evaluated by a volumetric 3D images obtained from cone beam CT. All samples attended to the specialist health center of dentistry in Al-Sadder City referred to CBCT by oral surgeons or orthodontists to detect the exact position of impacted upper canine in cases when there was no bulging buccally or palatally which aids to detect the exact position. Results: Mesio-palatal angulations had the highest rate (63.5%) followed by mesio-labial (19.2%), vertical (labial) (9.6%), disto-p
... Show MoreAn energy and exergy thermodynamic analysis using EES program was done for a domestic refrigerator working with R-134a using vapor compression refrigeration cycle. The analysis deals with the system component, i.e. compressor, condenser, evaporator and the expansion device. The analysis depends on the entropy generation minimization approach to improve the refrigerator performance by exploring the optimum design points. These design points were derived from three different theories governing the entropy generation minimization using exergy analyzing method. These theories were first applied to find the optimum balance between the hot inner condenser area and the cold inner evaporator area of the refrigerator and between
... Show MoreThe bony pelvis has a major role in weight transmission to the lower limbs. The complexities of its geometric form, material properties, and loading conditions render it an open subject to biomechanical analysis.
The present study deals with area measurement, and three-dimensional finite element analysis of the hip bone to investigate magnitudes, load direction, and stress distribution under physiological loading conditions.
The surface areas of the auricular surface, lunate surface, and symphysis pubis were measured in (35) adult hip bones. A solid model was translated into ANSYS parametric design language to be analyzed by finite element analysis method under different loading conditions.
The surface
... Show More