The influence and hazard of fire flame are one of the most important parameters that affecting the durability and strength of structural members. This research studied the influence of fire flame on the behavior of reinforced concrete beams affected by repeated load. Nine self- compacted reinforced concrete beams were castellated, all have the same geometric layout (0.15x0.15x1.00) m, reinforcement details and compressive strength (50 Mpa). To estimate the effect of fire flame disaster, four temperatures were adopted (200, 300, 400 and 500) oC and two method of cooling were used (graduated and sudden). In the first cooling method, graduated, the tested beams were leaved to cool in air while in the second method, sudden, water splash was used to reduce the temperature. Eight of the tested beams were divided in to four groups, each were burned to one of the adopted temperature for about half an hour and cooled by the adopted cooling methods (one by sudden cooling and the other by graduated cooling). After burning and cooling the beams were tested under the effect of repeated load (loading – unloading) for five cycle and then up to failure. As a compared with the non- burned beam, the results indicated that the ultimate load capacity of the tested beams were reduced by (16, 23, 54 and 71)% after being burned to (200, 300, 400 and 500) oC , respectively, for a case of sudden cooling and by (8, 14, 36 and 64)% , respectively, for a case of graduated cooling. It was also found that the effect of sudden cooling was greater than that in a case of graduated cooling. Regarding the failure mode, there was a different between the non-burred beam and the other ones even that all of them had the same geometric layout, compressive strength and reinforcement details. The failure mode for all burned beams was combined shear- flexure failure which was belong to the reduction in the compressive strength of the concrete due to the effect of the temperature rising , while the failure mode of the non-burned beam was flexure failure which was compatible with the preliminary design. It was also detected that the residual deflection proportion directly with the temperature, as the temperature increase to (200, 300, 400 and 500) oC the residual deflection compared with the non-burned beam increased by (32, 48, 326 and 358)% for a case of sudden cooling and by (13, 29, 303 and 332)% for a case of graduated cooling. Another effect was appear represented by the method of cooling, the results showed that the sudden cooling had more effect on the residual deflection than the graduated cooling by (15-6)% approximately. To vanish the residual deflection, numbers of cycle (loading-unloading) were required. It was found that this number increase as the temperature of burning increased and it’s also larger in a case of sudden cooling.
Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreStealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreTo investigate the research objectives, the researchers put the following hypothesis:
There was no statistically significant difference at the level of (0.05) between the average score of the students of the experimental group who studied the language of rhetoric according to model of learning method, and the average score of the students of the control group who studied the same article in the traditional way acquiring rhetorical concept. The researchers relied on the experimental design with the partial setting of the post-test, which depends on the experimental group that is taught using the model of the learning method, and the control group taught using the traditional method.
... Show MoreThe economical units in the world face great and rapid challenges in all aspects, a matter that requires facing these challenges throughout continuous improving and developing in their performance to keep their competitive position "place".
The Benchmarking Technique is one of the modern managerial tools that are proved to be successful in application throughout making continuous comparisons between products or services and the best – performance levels the compete with it . This is achieved to develop its performance and give it the competitive criterion with which it faces its competitors.
... Show More
A study was conducted at the University of Baghdad-College of Agricultural Engineering Sciences - Department of Agricultural Machinery and Equipment for the agricultural season 2023 with the aim of designing, manufacturing and testing a machine used to planting agricultural nursery tray with different types of vegetable or horticultural seeds or forest seeds of various forms, and using different agricultural media where they are conducted The planting process is by pulling the seeds with a negative pressure vacuum system, and then they are feding to the dishes in their right place to complete the planting process. The study included three factors: The speed of the main belt in three l