Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis offers a powerful technique for considering such matter. The Yield Lines Theory, which is one of limit state analysis based on expected failure criteria of slabs. The assumed failure criteria is termed by a pattern of yield lines, along that the reinforcement has yielded and the location of which counts loads and boundary conditions. This paper deals with comparison of Method 3 for two-way slabs that was provided by the ACI Code and exact derivation of this method by the Yield Lines Theory. Total of nine cases of slabs that have been described by method three are studied and evaluated by plastic analysis assumptions of the yield lines theory. The results are summarized in terms of proposed formulae that derived according to the Yield Lines Ttheory, which could be used as an alternative method for design of two-way reinforced concrete slabs in the ACI Code.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreA simple, cheap, fast, accurate, Safety and sensitive spectrophotometric method for the determination of sulfamethaxazole (SFMx), in pure form and pharmaceutical dosage forms. has been described The Method is based on the diazotization of the drug by sodium nitrite in acidic medium at 5Cº followed by coupling with salbutamol sulphate (SBS) drug to form orange color the product was stabilized and measured at 452 nm Beer’s law is obeyed in the concentration range of 2.5-87.5 ?g ml-1 with molar absorptivity of 2.5x104 L mole-1 cm-1. All variables including the reagent concentration, reaction time, color stability period, and sulfamethaxazole /salbutamol ratio were studied in order to optimize the reaction conditions. No interferences were
... Show MoreColloidal silver nanoparticles were prepared by single step green synthesis using aqueous extracts of the leaves of thyme as a function of different molar concentration of AgNO3 (1,2,3,4 mM(. The Field Emission Scanning Electron Microscopy (FESEM), UV-Visible and X-ray diffraction (XRD) were used to characterize the resultant AgNPs. The surface Plasmon resonance was observed at wavelength of 444 nm. The four intensive peaks of XRD pattern indicate the crystalline nature and the face centered cubic structure of the AgNPs. The average crystallite size of the AgNPs ranged from 18 to 22 nm. The FESEM image illustrated the well dispersion of the AgNPs and the spherical shape of the nanoparticles with a particle size distribution be
... Show MoreAs human societies grow, the problem of waste management becomes one of the pressing issues that need to be addressed. Recycling and reuse of waste are effective waste management measures that prevent pollution and conserve natural resources. In this study, the possibility of using glass waste as an alternative was used as a partial weight substitute for fine aggregates with replacement ratios of 10, 20, 30, and 40% by the weight, and formed into test models (15 cm * 15 cm ) cube and (15 cm * 30 cm) cylinder, then matured and tested their strength compression and tensile strength at the age of 7 and 28 days and compared with a reference or conventional concrete with a mixing ratio (1: 1.5: 3) as well as testing its worka
... Show MoreThis research aims to find how three different types of mouthwashes affect the depth of artificial white spot lesions. Teeth with various depths of white spot lesions were immersed in either splat mouthwash, Biorepair mouthwash, Sensodyne mouthwash, or artificial saliva (control)twice daily for one minute for 4 weeks and 8 weeks at 37°C. After this immersion procedure, lesion depth was measured using a diagnosed pen score. A one-way analysis of variance, Dunnett T3 and Tukey's post hoc α = .05 were used to analyze the testing data. Splat mouthwash enhanced the WSL remineralization and made the lowest ΔF compared with other mouthwashes in shallow and deep enamel after 4 and 8 weeks of treatment. In the repair groups, after 4 weeks
... Show More