Concrete is widely used in construction materials since early 1800's. It has been known that concrete is weak in tension, so it requires some addition materials to have ductile behavior and enhance its tensile strength and strain capacity to improve their uses. In this study reactive powder concrete (RPC) was used with steel fiber by using different types of cement; (Ordinary Portland cement (OPC) and/or Portland- Limestone cement (PLC)) with three types of mixtures (OPC at the first mix, 50 % OPC and 50 % PLC at the second mix and PLC at the third mix). The behavior of RPC with steel fibers on compressive strength and tensile strength of concrete with different ages of curing (7, 14, 28 and 60) days and shrinkage have been studied. The clo
... Show MoreDensity Functional Theory (DFT) at the B3LYP/ 6-311G basis set level and
semiemperical methods (PM3, AM1, and MINDO/3) were performed on six new
substituted Schiff bases derivatives of INHC (N-(3-(phenylidene-allylidene)
isonicotinohydrazide) using Gaussian-03 program. The calculated quantum chemical
parameters correlated to the inhibition efficiency were studied and discussed at their
equilibrium geometry and their correct symmetry (Cs). Comparisons of the order of
inhibition efficiency of the Schiff bases derivatives, and local electrophilic and
nucleophilic reactivity have analyzed. Some physical properties also were studied
such as heat of formation, total energy and dipole moment...etc. Also vibration
freq
In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
Semantic segmentation is effective in numerous object classification tasks such as autonomous vehicles and scene understanding. With the advent in the deep learning domain, lots of efforts are seen in applying deep learning algorithms for semantic segmentation. Most of the algorithms gain the required accuracy while compromising on their storage and computational requirements. The work showcases the implementation of Convolutional Neural Network (CNN) using Discrete Cosine Transform (DCT), where DCT exhibit exceptional energy compaction properties. The proposed Adaptive Weight Wiener Filter (AWWF) rearranges the DCT coefficients by truncating the high frequency coefficients. AWWF-DCT model reinstate the convolutional l
... Show MoreThe majority of systems dealing with natural language processing (NLP) and artificial intelligence (AI) can assist in making automated and automatically-supported decisions. However, these systems may face challenges and difficulties or find it confusing to identify the required information (characterization) for eliciting a decision by extracting or summarizing relevant information from large text documents or colossal content. When obtaining these documents online, for instance from social networking or social media, these sites undergo a remarkable increase in the textual content. The main objective of the present study is to conduct a survey and show the latest developments about the implementation of text-mining techniqu
... Show More