The influence and hazard of fire flame are one of the most important parameters that affecting the durability and strength of structural members. This research studied the influence of fire flame on the behavior of reinforced concrete beams affected by repeated load. Nine self- compacted reinforced concrete beams were castellated, all have the same geometric layout (0.15x0.15x1.00) m, reinforcement details and compressive strength (50 Mpa). To estimate the effect of fire flame disaster, four temperatures were adopted (200, 300, 400 and 500) oC and two method of cooling were used (graduated and sudden). In the first cooling method, graduated, the tested beams were leaved to cool in air while in the second method, sudden, water splash was used to reduce the temperature. Eight of the tested beams were divided in to four groups, each were burned to one of the adopted temperature for about half an hour and cooled by the adopted cooling methods (one by sudden cooling and the other by graduated cooling). After burning and cooling the beams were tested under the effect of repeated load (loading – unloading) for five cycle and then up to failure. As a compared with the non- burned beam, the results indicated that the ultimate load capacity of the tested beams were reduced by (16, 23, 54 and 71)% after being burned to (200, 300, 400 and 500) oC , respectively, for a case of sudden cooling and by (8, 14, 36 and 64)% , respectively, for a case of graduated cooling. It was also found that the effect of sudden cooling was greater than that in a case of graduated cooling. Regarding the failure mode, there was a different between the non-burred beam and the other ones even that all of them had the same geometric layout, compressive strength and reinforcement details. The failure mode for all burned beams was combined shear- flexure failure which was belong to the reduction in the compressive strength of the concrete due to the effect of the temperature rising , while the failure mode of the non-burned beam was flexure failure which was compatible with the preliminary design. It was also detected that the residual deflection proportion directly with the temperature, as the temperature increase to (200, 300, 400 and 500) oC the residual deflection compared with the non-burned beam increased by (32, 48, 326 and 358)% for a case of sudden cooling and by (13, 29, 303 and 332)% for a case of graduated cooling. Another effect was appear represented by the method of cooling, the results showed that the sudden cooling had more effect on the residual deflection than the graduated cooling by (15-6)% approximately. To vanish the residual deflection, numbers of cycle (loading-unloading) were required. It was found that this number increase as the temperature of burning increased and it’s also larger in a case of sudden cooling.
An edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those 
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern 
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the 
ability to learn and recognize what they had learned. The importance of developing such systems came after 
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This 
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder 
detection module depending on Multi-Connect Architecture Associative Memory (MCA) 
Abstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThis paper presents a parametric audio compression scheme intended for scalable audio coding applications, and is particularly well suited for operation at low rates, in the vicinity of 5 to 32 Kbps. The model consists of two complementary components: Sines plus Noise (SN). The principal component of the system is an. overlap-add analysis-by-synthesis sinusoidal model based on conjugate matching pursuits. Perceptual information about human hearing is explicitly included into the model by psychoacoustically weighting the pursuit metric. Once analyzed, SN parameters are efficiently quantized and coded. Our informal listening tests demonstrated that our coder gave competitive performance to the-state-of-the- art HelixTM Producer Plus 9 from
... Show MoreThe present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.
The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.