Several stress-strain models were used to predict the strengths of steel fiber reinforced concrete, which are distinctive of the material. However, insufficient research has been done on the influence of hybrid fiber combinations (comprising two or more distinct fibers) on the characteristics of concrete. For this reason, the researchers conducted an experimental program to determine the stress-strain relationship of 30 concrete samples reinforced with two distinct fibers (a hybrid of polyvinyl alcohol and steel fibers), with compressive strengths ranging from 40 to 120 MPa. A total of 80% of the experimental results were used to develop a new empirical stress-strain model, which was accomplished through the application of the particle swarm optimization (PSO) technique. It was discovered in this investigation that the new stress-strain model predictions are consistent with the remaining 20% of the experimental stress-strain curves obtained. Case studies of hybrid–fiber–reinforced concrete constructions were investigated in order to better understand the behavior of such elements. The data revealed that the proposed model has the highest absolute relative error (ARE) frequencies (ARE 10%) and the lowest absolute relative error (ARE > 15%) frequencies (ARE > 15%).
Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme
This study focuses on studying the effect of reinforced steel in detail, and steel reinforcement (tensile ratio, compression ratio, size, and joint angle shape) on the strength of reinforced concrete (compressive strength) Fc' and searching for the most accurate details of concrete divisions, their behavior, and corner resistance of reinforced concrete joint. The comparison of this paper with previous studies, especially in the studied properties. The conclusions of the chapter are summarized that these effects had a clear effect and a specific effect on the behavior and resistance of the reinforced concrete corner joints under the negative moments and under their influence and the resulting stress conditions. The types of defects that can
... Show MoreMost reinforced concrete (RC) structures are constructed with square/rectangular columns. The cross-section size of these types of columns is much larger than the thickness of their partitions. Therefore, parts of these columns are protruded out of the partitions. The emergence of columns edges out of the walls has some disadvantages. This limitation is difficult to be overcome with square or rectangular columns. To solve this problem, new types of RC columns called specially shaped reinforced concrete (SSRC) columns have been used as hidden columns. Besides, the use of SSRC columns provides many structural and architectural advantages as compared with rectangular columns. Therefore, this study was conducted to explain the structura
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the