The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The proposed method can determine the damage variables at the start of the loading process, and this variable continues to increase as the load progresses until complete failure. The results obtained using this method were assessed through previous studies, whereas three case studies for concrete specimens and reinforced concrete structural elements (columns and gable beams) were considered. Additionally, finite element models were also developed and verified. The results revealed good agreement in each case. Furthermore, the results show that the proposed method outperforms other methods in terms of damage prediction, particularly when damage is calculated using the stress ratio. Doi: 10.28991/CEJ-2022-08-02-03 Full Text: PDF
This paper deals with constructing mixed probability distribution from mixing exponential
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show Morefashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
You Mohammed, you're prophet of God and I'm Gabriel)). With this heavenly call which Mohammed, the messenger of God (may God's mercies be on him), got and when he left Hiraa cave and after getting the aye ((read with your God's name)), a new period of mankind's history started. From that time, the greatest state was established. There was no public treasury and no public financial resources at that time. Abu Baker (God bless him) spent a lot of money to support the costs of the new mission. After Al-Hijra, the bases of establishing the Islamic state were available but it lacked administrative and financial organizing. Therefore the prophet was very keen to find Islamic system which ensures justice and availability of
... Show MoreIn this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.
The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi
... Show MoreThe effect of the aqueous extract of fig (Ficus carica) fruit was studied by using different concentrations of this fruit (15, 20 and 25 mg/kg of body weight) on some hematological parameters (hemoglobin concentration, packed cell volume, white blood cell count and platelets count) in female rabbits. Twenty female rabbits were randomly divided into four groups (five animals in each group). Three groups were dosed with the concentrations mentioned above, while the last was administered with distilled water and considered as control group. These animals were orally dosed by aqueous extract using a micropipette. The results showed that there was a significant (P<0.05) increase in hemoglobin concentration and packed cell volume means for all
... Show More