A novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off
... Show MoreABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreChoosing antimicrobials is a common dilemma when the expected rate of bacterial resistance is high. The observed resistance values in unequal groups of isolates tested for different antimicrobials can be misleading. This can affect the decision to recommend one antibiotic over the other. We analyzed recalled data with the statistical consideration of unequal sample groups. Data was collected concerning children suspected to have typhoid fever at Al Alwyia Pediatric Teaching Hospital in Baghdad, Iraq. The study period extended from September 2021 to September 2022. A novel algorithm was developed to compare the drug sensitivity among unequal numbers of Salmonella typhi (S. Typhi) isolates tested with different antibacterials.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIn this paper fractional Maxwell fluid equation has been solved. The solution is in the Mettag-Leffler form. For the corresponding solutions for ordinary Maxwell fluid are obtained as limiting case of general solutions. Finally, the effects of different parameters on the velocity and shear stress profile are analyzed through plotting the velocity and shear stress profile.
The present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as te