The document discusses various masonry design codes and philosophies. It explains that limit states design (LSD) is considered the most rational as it considers both safety under ultimate loads and serviceability under service loads, unlike working stress method (WSM) and ultimate load method (ULM). LSD has been adopted by most modern codes like ACI, IBC, and Eurocode. The document then discusses provisions for axial load, shear, and other limit states in different codes based on LSD and allowable stress design (ASD) formats.
Analysis and design of pre engineered building using is 800:2007 and Internat...Pratik R. Atwal
Abstract: In this report, comparison is made between IS800:2007 & International standards. The entire range of preengineered building is studied while doing this comparison. A school building is designed using IS800:2007 & International standards by keeping the loading parameters similar, all the loads are applied accordance with Indian codes. An attempt is made to study the variation in tonnage as per IS800:2007 & International standards & possible reasons for variation in respective results.
Design and Detailing of RC Deep beams as per IS 456-2000VVIETCIVIL
Visit : https://teacherinneed.wordpress.com/
1. DEEP BEAM DEFINITION - IS 456
2. DEEP BEAM APPLICATION
3. DEEP BEAM TYPES
4. BEHAVIOUR OF DEEP BEAMS
5. LEVER ARM
6. COMPRESSIVE FORCE PATH CONCEPT
7. ARCH AND TIE ACTION
8. DEEP BEAM BEHAVIOUR AT ULTIMATE LIMIT STATE
9. REBAR DETAILING
10. EXAMPLE 1 – SIMPLY SUPPORTED DEEP BEAM
11. EXAMPLE 2 – SIMPLY SUPPORTED DEEP BEAM; M20, FE415
12. EXAMPLE 3: FIXED ENDS AND CONTINUOUS DEEP BEAM
13. EXAMPLE 4 : FIXED ENDS AND CONTINUOUS DEEP BEAM
Pushover is a static-nonlinear analysis method where a structure is subjected to gravity loading and a monotonic displacement-controlled lateral load pattern which continuously increases through elastic and inelastic behavior until an ultimate condition is reached. Lateral load may represent the range of base shear induced by earthquake loading, and its configuration may be proportional to the distribution of mass along building height, mode shapes, or another practical means.
The static pushover analysis is becoming a popular tool for seismic performance evaluation of existing and new structures. The expectation is that the pushover analysis will provide adequate information on seismic demands imposed by the design ground motion on the structural system and its components. The purpose of the paper is to summarize the basic concepts on which the pushover analysis can be based, assess the accuracy of pushover predictions, identify conditions under which the pushover will provide adequate information and, perhaps more importantly, identify cases in which the pushover predictions will be inadequate or even misleading.
Analysis and design of pre engineered building using is 800:2007 and Internat...Pratik R. Atwal
Abstract: In this report, comparison is made between IS800:2007 & International standards. The entire range of preengineered building is studied while doing this comparison. A school building is designed using IS800:2007 & International standards by keeping the loading parameters similar, all the loads are applied accordance with Indian codes. An attempt is made to study the variation in tonnage as per IS800:2007 & International standards & possible reasons for variation in respective results.
Design and Detailing of RC Deep beams as per IS 456-2000VVIETCIVIL
Visit : https://teacherinneed.wordpress.com/
1. DEEP BEAM DEFINITION - IS 456
2. DEEP BEAM APPLICATION
3. DEEP BEAM TYPES
4. BEHAVIOUR OF DEEP BEAMS
5. LEVER ARM
6. COMPRESSIVE FORCE PATH CONCEPT
7. ARCH AND TIE ACTION
8. DEEP BEAM BEHAVIOUR AT ULTIMATE LIMIT STATE
9. REBAR DETAILING
10. EXAMPLE 1 – SIMPLY SUPPORTED DEEP BEAM
11. EXAMPLE 2 – SIMPLY SUPPORTED DEEP BEAM; M20, FE415
12. EXAMPLE 3: FIXED ENDS AND CONTINUOUS DEEP BEAM
13. EXAMPLE 4 : FIXED ENDS AND CONTINUOUS DEEP BEAM
Pushover is a static-nonlinear analysis method where a structure is subjected to gravity loading and a monotonic displacement-controlled lateral load pattern which continuously increases through elastic and inelastic behavior until an ultimate condition is reached. Lateral load may represent the range of base shear induced by earthquake loading, and its configuration may be proportional to the distribution of mass along building height, mode shapes, or another practical means.
The static pushover analysis is becoming a popular tool for seismic performance evaluation of existing and new structures. The expectation is that the pushover analysis will provide adequate information on seismic demands imposed by the design ground motion on the structural system and its components. The purpose of the paper is to summarize the basic concepts on which the pushover analysis can be based, assess the accuracy of pushover predictions, identify conditions under which the pushover will provide adequate information and, perhaps more importantly, identify cases in which the pushover predictions will be inadequate or even misleading.
- Evolution of the design standards
- Composition and links between Eurocodes
- Fundamental requirement in Eurocodes
- Eurocode 0 : BASIS OF STRUCTURAL DESIGN
- Partial Factor method - probabilism
- Limit states
- Eurocode 1 - Actions and combinations
L'objectif de cette présentation est de mettre en évidence les différences majeures entre l’Eurocode 2 et le BAEL. Les points suivants seront abordés :
- Comparaison Eurocodes / BAEL sur les combinaisons des actions aux états-limites ;
- Comparaison Eurocodes / BAEL sur la loi de comportement des matériaux ;
- Comparaison Eurocodes / BAEL sur les méthodes d’analyse structurale et de justification des structures ;
- Repères nécessaires à l'application des règles de l’Eurocode 2 à travers l'analyse de calculs concrets.
- Analyse des résultats d’un dimensionnement selon les règles de l’Eurocode 2 et celles de BAEL au moyen d'exemples de calcul des précis différents éléments constructifs du bâtiment (poutres, poteaux, dalles …).
This publication provides a concise compilation of selected rules in the Eurocode 8 Part 1 & 3, together with relevant Cyprus National Annex, that relate to the seismic design of common forms of concrete building structure in the South Europe. Rules from EN 1998-3 for global analysis, type of analysis and verification checks are presented. Detail design check rules for concrete beam, column and shear wall, from EN 1998-3 are also presented. This guide covers the assessment of orthodox members in concrete frames. It does not cover design rules for steel frames. Certain practical limitations are given to the scope.
Due to time constraints and knowledge, I may not be able to address the whole issues.
Please send me your suggestions for improvement. Anyone interested to share his/her knowledge or willing to contribute either totally a new section about Eurocode 8-3 or within this section is encouraged.
Lecture 11 Shear Strength of Soil CE240Wajahat Ullah
Shear Strength of Soil
Shear strength in soils
Introduction
Definitions
Mohr-Coulomb criterion
Introduction
Lab tests for getting the shear strength
Direct shear test
Introduction
Procedure & calculation
Critical void ratio
This document presents an example of analysis design of slab using ETABS. This example examines a simple single story building, which is regular in plan and elevation. It is examining and compares the calculated ultimate moment from CSI ETABS & SAFE with hand calculation. Moment coefficients were used to calculate the ultimate moment. However it is good practice that such hand analysis methods are used to verify the output of more sophisticated methods.
Also, this document contains simple procedure (step-by-step) of how to design solid slab according to Eurocode 2.The process of designing elements will not be revolutionised as a result of using Eurocode 2. Due to time constraints and knowledge, I may not be able to address the whole issues.
Reliability and LRFD Specification شرح الكود المصرى للأحمال ECP-201_ Ch.2 _...mohamed Ismail
Reliability and LRFD Specification شرح الكود المصرى للأحمال ECP-201_ Ch.2 _Lecture 5.pdf
LRFD COMBINATIONS
Egyptian code for loads on buildings and structures
سلسلة شرح الكود المصرى للأحمال على المبانى و المنشأت
هنتعرف مع بعض على طريقة LRFD و مميزات استخدامها و هنقارنها مع طريقة ASD
Ultimate combinations
Load resistance factored design method
advantages of LRFD
factors for loads
factors for strength
Youtube :-https://www.youtube.com/channel/UCRmQWyw1F1cnD_XvoBhgv1Q/featured
FaceBook Page:-https://www.facebook.com/Advanced-Structures-Smart-Engineers-100680119286424/?notif_id=1649169062355891¬if_t=page_user_activity&ref=notif
Linked In:- https://www.linkedin.com/in/mohamed-ismail-fe-civil-07667478/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. Dr. A. Meher Prasad Department of Civil Engineering Indian Institute of Technology Madras email: prasadam@iitm.ac.in MASONRY CODES OF PRACTICE
2.
3.
4. Design Philosophies … “ Limit states design” is supposed to be the most rational design philosophy. Why?
5.
6. WSM and ULM WSM attempts to ensure adequate safety under service loads, while ULM attempts to ensure adequate safety under extreme loads. WSM does not investigate behaviour beyond service loads, ULM does not guarantee serviceability under service loads.
7. Limit States Method (LSM) A limit state is a state of impending failure , beyond which a structure ceases to perform its intended function satisfactorily, in terms of either strength or serviceability ; i.e., it either collapses or becomes unserviceable . Unlike WSM , which bases calculations on service load conditions alone, and unlike ULM , which bases calculations on ultimate load conditions alone, LSM aims for a comprehensive and rational solution to the design problem, by considering safety at ultimate loads and serviceability at working loads . LSM is described as a ‘semi-probabilistic’ method or a ‘Level I reliability’ method
8. Strength Design Model pdf S n R n R and S are independent random variables Probabilistic approach: nominal / characteristic values (deterministic) Moral: There is always a risk of failure. No structure is 100% safe! R S Structure will survive! R < S Structure will fail!
9. F s = R n / S n P f = Prob [ R < S ] Reliability = Probability of survival = 1 - Probability of failure pdf S n R n Deterministic measure of safety: Probabilistic measure of safety: f S ( s ) f R ( r ) = Prob
10. R k S k Load and Resistance Design (LRFD) Format Design Resistance Design Load Effect S n R n S n = R n Load factor > 1 (‘overloading’) Resistance factor < 1 (‘understrength’) (ULM format) (WSM format)
11. Partial load and material safety factors Ultimate limit states – partial load factors: UL = 1.5 (DL + LL) UL = 1.5 (DL + QL) or (0.9DL + 1.5 QL) UL = 1.2 (DL + LL + QL) Note : It is not correct to apply 33.3% increase in allowable stress in WSM when only DL and QL are involved! Ultimate limit states – material safety factors : Concrete: = 1.5 Steel: = 1.15
12.
13.
14.
15.
16.
17.
18.
19.
20. IS 1905 :1987: a stress reduction factor k s which depends on slenderness ratio and eccentricity of load (Table 9 of Code) Slenderness effects on axial compression Axial Compression - ASD
21. Image is not clear The previous fig is the same….
23. Reinforced Masonry Axial Compression - ASD ACI 530-02 IBC 2000, NZS:4230: Part 1 , Eurocode 6, IS: 1905-1987 No Provisions have been given
24. Maximum h/t Ratio There is no directly specified limit to the h/t ratio. It is indirectly specified through the check against Euler’s buckling formula ACI 530-02 IS: 1905-1987 Maximum h/t ratio depends on the storey height and type of mortar used. IBC 2000, NZS:4230: Part 1 , Eurocode 6 No Provisions have been given
31. Axial compression with flexure Flexure and Axial Wall Loading Interaction Diagram Reinforced Masonry
32. Design for Shear – ASD ACI 530-02 Shear stress shall not exceed either of 0.125 , 0.83MPa or v+0.45N v /A n IBC 2000, NZS:4230: Part 1 , Eurocode 6 No Provisions have been given IS: 1905-1987 Permissible shear stress is given by: F v = 0.1 + /6 < 0.5MPa Un Reinforced Masonry
33. If shear reinforcement is not provided ACI 530-02 For flexural members, For shear walls, a. M/Vd v < 1, F v = 0.028[4-M/Vd v ] < (0.55-0.31M/Vd v )MPa b. M/Vd v > 1, F v =0.083 < 0.24MPa F v = 0.083 < 0.35MPa, IBC 2000, NZS:4230: Part 1 , Eurocode 6, IS: 1905-1987 No Provisions have been given Design for Shear – ASD Reinforced Masonry
34. ACI 530-02 For flexural members, Fv = 0.25 < 1.03MPa For shear walls, a. M/Vd v < 1, Fv = 0.042[4-M/Vdv] < (0.82-0.031M/Vdv)MPa b. M/Vd v > 1, Fv = 0.125 < 0.52MPa If shear reinforcement is provided Design for Shear – ASD Reinforced Masonry
35. IS: 1905-1987 Permissible shear stress is given by: Fv = 0.1 + /6 < 0.5MPa IBC 2000, NZS:4230: Part 1 , Eurocode 6 No Provisions have been given ASD format If shear reinforcement is provided Design for Shear – ASD Reinforced Masonry
36.
37.
38.
39. IS 1905:1987: takes care of sliding failure by specifying permissible shear stress URM Average axial stress not more than 2.4 MPa
46. AXIAL COMPRESSION - LSD Un Reinforced Masonry: ACI 530-02 IS: 1905-1987, NZS:4230: Part 1 IBC 2000 Eurocode 6 Charactersistic Compressive strength of Masonry is Maximum compressive strain is limited to 0.002 No Provisions are given
47. Reinforced Masonry: ACI 530-02 Eurocode 6, IS: 1905-1987 No Provisions are given AXIAL COMPRESSION - LSD IBC 2000 NZS:4230: Part 1
48. AXIAL COMPRESSION WITH FLEXURE - LSD Un Reinforced Masonry: ACI 530-02, IBC 2000, NZS:4230: Part 1, IS 1905- 1987 No Provisions are given Eurocode 6 1. Design Md equals 2. In case of vertical load, increases to 3. Lateral resistance
49. AXIAL COMPRESSION WITH FLEXURE - LSD Reinforced Masonry: ACI 530-02 2. For walls with factored axial stress < 0.2f m , 1. For walls with factored axial stress < 0.05f m , and SR > 30 shall be designed as above with walls having t min =150mm. 3. at extreme fiber is 0.0035 for clay masonry and 0.002 for concrete masonry.
50. AXIAL COMPRESSION WITH FLEXURE - LSD Reinforced Masonry: IBC 2000 1. For wall design against out-of-plane loads, all values are same as of the ACI code, except 2. is the same as in the ACI code. NZS:4230: Part 1 1. is 0.0025 for unconfined concrete masonry and 0.008 for confined concrete masonry Eurocode 6 For singly reinforced rectangular c/s subjected to bending only IS 1905- 1987 No provisions
51.
52.
53. DESIGN FOR SHEAR - LSD Reinforced Masonry: NZS:4230: Part 1 1. Shear strength is given in section 7.3.2.1 2. Minimum value of A v = 0.15 b w s/f y 3. 4. Required area of shear friction reinforcement is Eurocode 6 1. Ignoring shear reinforcement: 2. Taking shear reinforcement into account: IS: 1905-1987 No Provisions