The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The proposed method can determine the damage variables at the start of the loading process, and this variable continues to increase as the load progresses until complete failure. The results obtained using this method were assessed through previous studies, whereas three case studies for concrete specimens and reinforced concrete structural elements (columns and gable beams) were considered. Additionally, finite element models were also developed and verified. The results revealed good agreement in each case. Furthermore, the results show that the proposed method outperforms other methods in terms of damage prediction, particularly when damage is calculated using the stress ratio. Doi: 10.28991/CEJ-2022-08-02-03 Full Text: PDF
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreWe have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.
The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F
... Show MoreDensity Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreMethotrexate (MTX) is a folate antagonist widely used in the treatment of neoplastic diseases; its biotransformation in the liver produced active metabolites that promote hepatotoxicity. The present study was designed to evaluate the hepatoprotective effect of aqueous extract of Camellia sinensis (Green tea) against MTX-induced liver damage in rats. A model of liver injury in rats was induced by intraperitoneal injection of 20mg/kg MTX as a single dose followed by saline and 1.25% and 2.5% aqueous extract of green tea (GTE) were orally administered 7 days prior and 5 days after MTX-intoxication as a sole source of drinking water. After killing the animals, blood samples were obtained for evaluation of serum levels of alanine and
... Show MoreChalcopyrite thin films ternary Silver Indium Diselenide AgInSe2 (AIS) pure and Aluminum Al doped with ratio 0.03 was prepared using thermal evaporation with a vacuum of 7*10-6 torr on glass with (400) nm thickness for study the structural and optical properties. X-ray diffraction was used to show the inflance of Al ratio dopant on structural properties. X-ray diffraction show that thin films AIS pure, Al doped at RT and annealing at 573 K are polycrystalline with tetragonal structure with preferential orientation (112). raise the crystallinity degree. AFM used to study the effect of Al on surfaces roughness and Grain Size Optical properties such as the optical band gap, absorption coefficient, Extinction coefficient, refractive ind
... Show MoreIn this work, results of a mathematical analysis of the role of workpiece preheating in laser keyhole welding were presented. This analysis considered the steady-state welding as well as certain range of boundary conditions over which preheating effect would be indicated. This work is an attempt to interpret the role of preheating to increase welding depth and perform keyhole welding with high quality using physical and thermal properties of steel alloys.
The aim of this study was to determine the effect of different dietary fat on carcass traits in Japanese quail (Coturnix coturnix japonica). A total of 168 7-week-old Japanese quail (48 males and 120 females) were used in this study. They were evenly distributed into 4 treatment groups, with 3 replicates per group containing 4 males and 10 females each. The birds were fed a basal diet with different fats (sunflower, flax, corn, and fish oils) at a 3% level for 13 weeks. On the last day of the experiment, 12 birds were randomly selected from each treatment group (6 males and 6 females) and slaughtered to determine carcass characteristics included in this study, which were carcass weight, dressing percentage with or without giblets, and the r
... Show More