This study presents experimental and numerical investigations on seven one-way, reinforced concrete (RC) slabs with a new technique of slab weight reduction using polystyrene-embedded arched blocks (PEABs). All slabs had the same dimensions, steel reinforcement, and concrete compressive strength. One of these slabs was a solid slab, which was taken as a control slab, while the other six slabs were cast with PEABs. The main variables were the ratio of the length of the PEABs to the length of the slab (lp/L) and the ratio of the height of the PEABs to the total slab depth (hP/H). The minimum decrease in the ultimate load capacity was about 6% with a minimum reduction in the slab weight of 15%. In contrast, the maximum decrease in the ultimate load capacity was about 24% with a maximum reduction in the slab weight of 40%. Moreover, the mode of failure changed from flexure to shear failure, especially for those slabs with an lP/L ratio equal to one. The geometric and material non-linearity was adopted in the proposed finite element (FE) model to simulate the slabs with PEABs using Abaqus software. Good agreement was obtained between the developed FE and experimental results.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreThe adsorption of fexofenadine drug by activated charcoal powder impregnated with hydrogen peroxide (IAC) to improve its surface properties was investigated. The investigation also aimed to assess the effect of the repeated dose in increasing the amount of the drug adsorbed. The powder activated charcoal was impregnated with H2O2 3%. The effects of pH of the solution, concentration of the drug and time of the reaction parameters were investigated by using UV-Vis spectroscopy. The IAC was brought in contact with the drug solution in different pH (2, 4, 7 and 9), drug concentrations (30, 60, 90 and 120 µg ml-1) and time (15, 30, 45 and 60 minutes). After each experiment, a repeated dose of IAC was introd
... Show MoreIn the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used t
The main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re
... Show MoreBackground: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p
One hundred thirty four urine samples were collected from diabetic patients during the period from March –November -2014. From these samples there were 62.7% positive samples, women represented 45.3% and men represented 54.7% , some of them were a symptomatic as women represented 60.5% and men represented 58.7% and some were with clinical symptoms with or without a history of UTI. Hypertension diabetic women represented 45% and men represented 26% .Men suffering from prostate enlargement were represented 35% from the total diabetics .The E.coli isolates were represented 28.6% from the total cases ,Klebsiella spp isolates represented 20%, S. aureus isolates represented 16.7%,P
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.