Preferred Language
Articles
/
kBizZ5UBVTCNdQwC9S0d
Simulation and design model for reinforced concrete slabs with lacing systems
...Show More Authors

Lacing reinforcement plays a critical role in the design and performance of reinforced concrete (RC) slabs by distributing the applied loads more evenly across the slab, ensuring that no specific area of the slab is overloaded. In this study, nine slabs, divided into three groups according to the investigated parameters, were meticulously designed and evaluated to study the interplay between the lacing reinforcement and other key parameters. Each slab was crafted for simple support and was subjected to both static and repeated two-point load tests. The lacing reinforcement had an angle of 45° with various tension and lacing steel. The repeated-tested specimens with lacing reinforcement experienced smaller ductility than those of similar static-tested specimens, where the reduction in ductility factor ranged between 8.4% and 22.3% for all specimens. Additionally, the tested slabs were analyzed numerically using the ABAQUS software package. The validated FE test program was used to study the effect of varying the lacing reinforcement ratio, the compressive strength of concrete, and the material types of the tension and lacing reinforcements. The lacing reinforcement becomes more effective in increasing the slab capacity when using the higher compressive strength of concrete.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Design and Analysis of New Prosthetic Foot.
...Show More Authors

There is a variety of artificial foot designs variable for use with prosthetic legs . Most of the design can be divided into two classes, articulated and non-articulated feet. one common non-articulated foot is the SACH . The solid ankle cushion heel foot referred to as the SACH foot has a rigid keel .

One key or the key factor in designing a new prosthesis is in the analysis of a patients response .

 This view is the most important because if the foot does not provide functional , practical or cosmetically acceptable characteristics the patient will not feel comfortable with the prosthesis , therefore design and manufacturing a new foot is essential, this foot made from polyethylene, its different shape and characte

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Passive Design Strategies to Enhance Natural Ventilation in Buildings "Election of Passive Design Strategies to Achieve Natural Ventilation in Iraqi Urban Environment with Hot Arid Climate"
...Show More Authors

The natural ventilation in buildings is one of effective strategies for achieving energy efficiency in buildings by employing methods and ways of passive design, as well as its efficiency in providing high ranges of thermal comfort for occupants in buildings and raises their productivity. Because the concept of natural ventilation for many people confined to achieve through the windows and openings only, become necessary to provide this research to demonstrate the various passive design strategies for natural ventilation. Then, research problem: Insufficient knowledge about the importance and mechanism of the application of passive design strategies for natural ventilation in buildings. The research objective is: Analysis of passive desi

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Modern Applications Of Geotechnical Engineering And Construction Geotechnical Engineering And Construction
Numerical Modeling of Honeycombed Geocell Reinforced Soil
...Show More Authors

Shallow foundations have been commonly used to transfer load to soil layer within the permissible limits of settlement based on the bearing capacity of the soil. For most practical cases, the shape of the shallow foundation is of slight significance. Also, friction resistance forces in the first layers of soils are negligible due to non-sufficient surrounding surface area and compaction conditions. However, the bearing capacity of a shallow foundation can be increased by several techniques. Geocell is one of the geosynthetic tool applied mainly to reinforce soil. This study presents a numerical approach of honeycombed geocell steel panels reinforcing the sandy soil under shallow foundation, and several parameters are investigated such as th

... Show More
Preview PDF
Crossref (13)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
1-DOF Model for Fluid-Structure-Interaction Vibration Analysis
...Show More Authors

In this paper an attempt to provide a single degree of freedom lumped model for fluid structure interaction (FSI) dynamical analysis will be presented. The model can be used to clarify some important concept in the FSI dynamics such as the added mass, added stiffness, added damping, wave coupling ,influence mass coefficient and critical fluid depth . The numerical results of the model show that the natural frequency decrease with the increasing of many parameters related to the structure and the fluid .It is found that the interaction phenomena can become weak or strong depending on the depth of the containing fluid .The damped and un damped free response are plotted in time domain and phase plane for different model parameters It is fou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Runge-kutta Numerical Method for Solving Nonlinear Influenza Model
...Show More Authors
Abstract<p>The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.</p>
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Mon Mar 31 2025
Journal Name
Iraqi Statisticians Journal
Hypothesis Testing for Non-Normal Multiple Compact Regression Model
...Show More Authors

Generalized multivariate transmuted Bessel distribution belongs to the family of probability distributions with a symmetric heavy tail. It is considered a mixed continuous probability distribution. It is the result of mixing the multivariate Gaussian mixture distribution with the generalized inverse normal distribution. On this basis, the paper will study a multiple compact regression model when the random error follows a generalized multivariate transmuted Bessel distribution. Assuming that the shape parameters are known, the parameters of the multiple compact regression model will be estimated using the maximum likelihood method and Bayesian approach depending on non-informative prior information. In addition, the Bayes factor was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Wasit Journal For Pure Sciences
Suitable Methods for Solving COVID-19 Model in Iraq
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
The International Journal Of Nonlinear Analysis And Application
Atan regularized for the high dimensional Poisson regression model
...Show More Authors

Variable selection in Poisson regression with high dimensional data has been widely used in recent years. we proposed in this paper using a penalty function that depends on a function named a penalty. An Atan estimator was compared with Lasso and adaptive lasso. A simulation and application show that an Atan estimator has the advantage in the estimation of coefficient and variables selection.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref