A novel demountable shear connector for precast steel‐concrete composite bridges is presented. The connector uses high‐strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents slip of bolts within their holes. Moreover, the connector promotes accelerated construction and overcomes typical construction tolerances issues of precast structures. Most importantly, the connector allows bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (i) precast deck panels can be rapidly uplifted and replaced; (ii) connectors can be rapidly removed and replaced; and (iii) steel beams can be replaced, while precast decks and shear connectors can be reused. A series of push‐out tests are conducted to assess the behavior of the connector and quantify the effect of important parameters. The experimental results show shear resistance, stiffness, and slip capacity significantly higher than those of welded shear studs along with superior stiffness and strength against slab uplift. Identical tests reveal negligible scatter in the shear load – slip displacement behavior. A design equation is proposed to predict the shear resistance with absolute error less than 8%.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreLaser beam has been widely used to improve the mechanical properties of the metals. It used for cutting, drilling, hardening, welding……etc. The use of Laser beam has many features in accuracy and speeding in work, also in the treatment of metals locally, and in the places that is hard to reach by traditional ways. In this research a surface treatment was done to medium carbon steel (0.4%C) which is common kind of steel that is used in industry. Pulsing Neodymium -YAG Laser has been used and 1.06 micrometer wave length and 5 msec and the distance is about 30 centimeter between the exit area of the Laser beam from the system and the piece that treated . We are going to check the fatigue resistance for samples that is
... Show MoreFor the time being, the cold-formed sections are widely used due to their simple manufacturing and construction processes. To be feasible, the strength of cold-formed columns should be determined based on their post-buckling behavior. Post-buckling relations are cumbersome and need design aids similar to those of American Iron and Steel Institute (AISI) to be applicable. These design aids have been developed to sections and materials other than those available in the local market. Therefore, this paper tries to develop a general finite element model to simulate the postbuckling behavior of cold-formed steel columns. Shell element has been used to discretize the web, flanges, and lips of the column. A linear bucking analy
... Show MoreIn this paper, the behavior of spliced steel girders under static loading is investigated. A group of seven steel I-girders were tested experimentally. Two concentrated loads were applied to each specimen at third points and the load was increased incrementally up to the yield of the specimen. Two types of splices were considered; the bearing type and the friction-grip type splices. For comparison, an analytical study was made for the tested girders in which the finite element analysis program (Abaqus) was used for analysis. It was found that the maximum test load for spliced girders with bearing type splices was in the range of (34%) to (67%) of the maximum test load for the reference girder. For girders spliced by using friction-grip t
... Show MoreAbstract
This study investigated the optimization of wear behavior of AISI 4340 steel based on the Taguchi method under various testing conditions. In this paper, a neural network and the Taguchi design method have been implemented for minimizing the wear rate in 4340 steel. A back-propagation neural network (BPNN) was developed to predict the wear rate. In the development of a predictive model, wear parameters like sliding speed, applying load and sliding distance were considered as the input model variables of the AISI 4340 steel. An analysis of variance (ANOVA) was used to determine the significant parameter affecting the wear rate. Finally, the Taguchi approach was applied to determine
... Show MoreA few examinations have endeavored to assess a definitive shear quality of a fiber fortified polymer (FRP)- strengthened solid shallow shafts. Be that as it may, need data announced for examining the solid profound pillars strengthened with FRP bars. The majority of these investigations don't think about the blend of the rigidity of both FRP support and cement. This examination builds up a basic swagger adequacy factor model to evaluate the referenced issue. Two sorts of disappointment modes; concrete part and pulverizing disappointment modes were examined. Protection from corner to corner part is chiefly given by the longitudinal FRP support, steel shear fortification, and cement rigidity. The proposed model has been confirmed util
... Show MoreThe problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all
... Show More