In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated through the strain profiles, stress distribution, normal force-axial strain, and moment-curvature relationships, shows that the numerical model has good numerical accuracy and is capable of predicting the behavior of structural concrete members with different partially prestressing ratios at serviceability and ultimate loading stages.
Tests were performed on Marshall samples and were implemented for permanent deformation and resilient modulus (Mr) under indirect tensile repeated loading (ITRL), with constant stress level. Two types of liquid asphalt (cutback and emulsion) were tried as recycling agents, aged materials that were reclaimed from field (100% RAP), samples were prepared from the aged mixture, and two types of liquid asphalt (cutback and emulsion) with a weight content of 0.5% were utilized to prepare a recycled mixture. A group of twelve samples was prepared for each mixture; six samples were tested directly for ITRL test (three samples at 25˚C and three samples at 40˚C), an average value for ITRL for every three samples was calculated (
... Show MoreReactive Powder Concrete (RPC) could be considered as the furthermost significant modern high compressive strength concrete. In this study, an experimental investigation on the impact of micro steel fiber volume fraction ratio and gamma ray irradiation duration influence upon the compressive strength of RPC is presented. Three volume fraction ratios (0.0, 1.0 and 1.5) % was implemented. For each percentage of the adopted fiber ratios, six different irradiation duration was considered; these are (1, 2, 3, 4, 5 and 6) days. Gamma source (Cs-137) of energy (0.662) MeV and activity (6) mci was used. In a case of zero volume fraction ratio, the experimental results showed that gamma ray had a significant influence on the reducing of the
... Show MoreReactive Powder Concrete (RPC) could be considered as the furthermost significant modern high compressive strength concrete. In this study, an experimental investigation on the impact of micro steel fiber volume fraction ratio and gamma ray irradiation duration influence upon the compressive strength of RPC is presented. Three volume fraction ratios (0.0, 1.0 and 1.5) % was implemented. For each percentage of the adopted fiber ratios, six different irradiation duration was considered; these are (1, 2, 3, 4, 5 and 6) days. Gamma source (Cs-137) of energy (0.662) MeV and activity (6) mci was used. In a case of zero volume fraction ratio, the experimental results showed that gamma ray had a significant influence on the reducing of the
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show MoreThe emergence of SARS-CoV-2, the virus responsible for the COVID-19 pandemic, has resulted in a global health crisis leading to widespread illness, death, and daily life disruptions. Having a vaccine for COVID-19 is crucial to controlling the spread of the virus which will help to end the pandemic and restore normalcy to society. Messenger RNA (mRNA) molecules vaccine has led the way as the swift vaccine candidate for COVID-19, but it faces key probable restrictions including spontaneous deterioration. To address mRNA degradation issues, Stanford University academics and the Eterna community sponsored a Kaggle competition.This study aims to build a deep learning (DL) model which will predict deterioration rates at each base of the mRNA
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More