In this paper, fire resistance and residual capacity tests were carried out on encased pultruded glass fiber-reinforced polymer (GFRP) I-beams with high-strength concrete beams. The specimens were loaded concurrently under 25% of the ultimate load and fire exposure (an increase in temperature of 700 °C) for 70 min. Subsequently, the fire-damaged specimens were allowed to cool and then were loaded statically until failure to explore the residual behaviors. The effects of using shear connectors and web stiffeners on the residual behavior were investigated. Finite Element (FE) analysis was developed to simulate the encased pultruded GFRP I-beams under the effect of fire loading. The thermal analyses were performed using the general-purpose FE ABAQUS package. This simulation considered the material and geometric nonlinearities and the effect of temperature on the constitutive models of materials. The FE results showed good agreement with the experimental data. The residual peak load and the corresponding mid-span deflection obtained were 5% and 4% higher than those of the experimental results. The validated FE model was utilized to explore the influence of the tensile strength of GFRP and concrete compressive strength on the post-fire flexural behavior of the encased GFRP I-beams. The encased GFRP beams kept higher residual peak loads. Moreover, the encased GFRP beam with shear connectors (EGS-F), encased GFRP beam with web stiffeners (EGW-F), and encased GFRP beam with shear connectors and web stiffeners (EGSW-F) exhibited higher residual peak loads due to the presence of shear connectors and web stiffeners. However, the web stiffeners showed a minor enhancement in the peak load.
This study compared the clinicopathological, immunohistochemical characteristics and Epstein-Barr virus (EBV) detection of Burkitt's lymphoma (BL) in the abdomen and jaw of Iraqi patients. A cohort/retrospective study was carried out between August and September 2024 using 25 tissue blocks (14 gnathic and 11 abdominal BL) from the Oral and Maxillofacial Laboratory, University of Baghdad, College of Dentistry, and the National Centre for Educational Laboratories. The sections were stained with haematoxylin and eosin (H&E), while CD10, CD20, Bcl-2, BCl-6, C-Myc and Ki-67 markers were used for diagnosis. The DNA detection of the EBV was performed by polymerase chain reaction (PCR). The tumours showed 22 classical and 3 atypical histologi
... Show MoreZernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show MoreCystic fibrosis (CF) is an autosomal recessive multisystem disease that results from mutation(s) of the cystic fibrosis transmembrane conductance regulator (
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show MoreIn this work, the spectra of plasma glow produced by Nd:YAG laser operated at 1.064 μm on Al-Mg alloys with same molar ratio samples in air were analyzed by comparing the atomic lines of aluminum and magnesium with that of strong standard lines. The effect of laser energies on spectral lines, produced by laser ablation, were investigated using optical spectroscopy, the electron density was measured utilizing the Stark broadening of magnesium-aluminum lines and the electron temperature was calculated from the standard Boltzmann plot method. The results that show the electron temperature increases in magnesium and aluminum targets but decreases in magnesium: aluminum alloy target, also show the electron density increase all the aluminum,
... Show MoreFallacies are incorrect reasoning that make an argument seem less logically credible and easier to be identified as unsound. They are widespread; individuals commit them while engaging in various activities, including at work, at home, while creating advertisements, and in the media. This study aims to investigate the rhetorical strategies accompanied with producing the fallacious arguments selected from the American Film “12 Angry Men (1957)”. The study adopts Damer’s (2009) model for the identification of fallacy. As for rhetorical analysis, the study adopts Aristotle’s triangle of rhetoric and McGuigan’s (2007) taxonomy of rhetorical devices. The results uncover that the most violated criteria are relevance, acceptabili
... Show MoreThe use of non-parametric models and subsequent estimation methods requires that many of the initial conditions that must be met to represent those models of society under study are appropriate, prompting researchers to look for more flexible models, which are represented by non-parametric models
In this study, the most important and most widespread estimations of the estimation of the nonlinear regression function were investigated using Nadaraya-Watson and Regression Local Ploynomial, which are one of the types of non-linear
... Show MoreThis study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern h
... Show MorePathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable
... Show More