This study is a numerical investigation of the performance of reinforced concrete (RC) columns after fire exposure. This study aims to investigate the effect of introducing lateral ties and using the RC jacket on improving post-fire behavior of these columns, the effect of the duration of the fire on ultimate load of columns. The analysis was performed through ABAQUS, a 3D – non-linear finite element program. 4 m tall lengthening square RC column with a cross- section of 0.4 m × 0.4 m was used as a test specimen. The RC column was reinforced by 4Ø28 mm longitudinal bars bonded by steel tie bars of Ø10 mm spaced at 400 mm. The firing temperature was increased to 60
Moisture damage is described as a reduction in stiffness and strength durability in asphalt mixtures due to moisture. This study investigated the influence of adding nano silica (NS) to the Asphalt on the moisture susceptibility of hot-mix-asphalt (HMA) mixtures under different aging conditions. NS was mixed with asphalt binder at concentrations of 2%, 4%, and 6% by weight of the binder. To detect the microstructure changes of modified Asphalt and estimate the dispersion of NS within the Asphalt, the field emission scanning electron microscope (FE-SEM) was used. To examine the performance of Asphalt mixed with NS at different aging stages (short-term and long-term aging), asphalt mixture tests such as Marshall stability,
... Show MoreHigh-volume traffic with ultra-heavy axle loads combined with extremely hot weather conditions increases the propagation of rutting in flexible pavement road networks. Several studies suggested using nanomaterials in asphalt modification to delay the deterioration of asphalt pavement. The current work aims to improve the resistance of hot mix asphalt (HMA) to rutting by incorporating Nano Silica (NS) in specific concentrations. NS was blended into asphalt mixtures in concentrations of 2, 4, and 6% by weight of the binder. The behavior of asphalt mixtures subjected to aging was investigated at different stages (short-term and long-term aging). The performance characteristics of the asphalt mixtures were evaluated using the Marshall s
... Show MoreIn this research, the Williamson-Hall method and of size-strain plot method was employed to analyze X- ray lines for evaluating the crystallite size and lattice strain and of cadmium oxide nanoparticles. the crystallite size value is (15.2 nm) and (93.1 nm) and lattice strain (4.2 x10−4 ) and (21x10−4) respectively. Also, other methods have been employed to evaluate the crystallite size. The current methods are (Sherrer and modified Sherrer methods ) and their results are (14.8 nm) and (13.9nm) respectively. Each method of analysis has a different result because the alteration in the crystallite size and lattice strain calculated according to the Williamson-Hall and size-strain plot methods shows that the non-uniform strain in nan
... Show MoreSince the beginning of the last century, the competition for water resources has intensified dramatically, especially between countries that have no agreements in place for water resources that they share. Such is the situation with the Euphrates River which flows through three countries (Turkey, Syria, and Iraq) and represents the main water resource for these countries. Therefore, the comprehensive hydrologic investigation needed to derive optimal operations requires reliable forecasts. This study aims to analysis and create a forecasting model for data generation from Turkey perspective by using the recorded inflow data of Ataturk reservoir for the period (Oct. 1961 - Sep. 2009). Based on 49 years of real inflow data
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreVisual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe aim of this study is to estimate the parameters and reliability function for kumaraswamy distribution of this two positive parameter (a,b > 0), which is a continuous probability that has many characterstics with the beta distribution with extra advantages.
The shape of the function for this distribution and the most important characterstics are explained and estimated the two parameter (a,b) and the reliability function for this distribution by using the maximum likelihood method (MLE) and Bayes methods. simulation experiments are conducts to explain the behaviour of the estimation methods for different sizes depending on the mean squared error criterion the results show that the Bayes is bet
... Show More