One of the most important parameters determining structural members' durability and strength is the fire flame's influence and hazard. Some engineers have advocated using advanced analytical models to predict fire spread impact within a compartment and considering finite element models of structural components to estimate the temperatures within a component using heat transfer analysis. This paper presented a numerical simulation for a reinforced concrete beam’s structural response in a case containing Water Absorbing Polymer Spheres (WAPS) subjected to fire flame effect. The commercial finite element package ABAQUS was considered. The relevant geometrical and material parameters of the reinforced concrete beam model at elevated temperature are first suggested as a numerical model. After that, the suggested numerical model was validated against the experimental tests conducted in this study. The validated numerical model was used to conduct a parametric study to investigate the effects of two important parameters on the structural behavior after being exposed to fire flame. The effect of burning temperatures (500, 600, and 700) oC, as well as the influence of fire duration (1 and 2) hours, were included. The experimental program validation requirement comprised four self-compacted reinforced concrete beams each of the same geometric layout (150x200x1500) mm, reinforcing details, and compressive strength (fc'=50 MPa). Four percentages of (WAPS) were considered (0, 1, 2, and 3)%. The specimens were exposed to a fire flame with a steady-state temperature (500°C), a rising rate compatible with ASTM-E119, a one-hour duration, and a sudden cooling procedure. A static (two-point) load was applied to the burned beams. Through the assessed numerical model, the numerical analysis offered by the WAPS ratio effect was carried out for the reinforced concrete beam under the effect of static load. The findings revealed that the WAPS ratio substantially impacted structural behavior. The numerical model's results were in reasonable agreement with the experimental results. Concerning the fire exposure duration (two hours) at 500 oC, the specimens containing a ratio (3%) of WAPS improved the ultimate load and the ultimate deflection by about (46.63 and 72.24)%, respectively. The highest percentage variation of the absorbed energy at failure load was also detected in the ratio (3%) to be (139.43) %. As for the hardening concrete properties (compressive strength, splitting tensile strength, and modulus of elasticity), the residual strength was (61.06, 48.87, and 32.00)%, respectively. Regarding the steady-state burning temperature (500, 600, and 700)oC for a one-hour duration, the specimens with a ratio of (3%) WAPS improved the ultimate load by about (40.70, 62.00, and 40.76)%, respectively, corresponding to zero percentage of WAPS. The residual compressive strength, splitting tensile strength, and modulus of elasticity were (72.40, 56.12, and 43.78)%, (74.36, 56.50, and 44.79)%, and (45.23, 36.57, and 28.94)%, respectively.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreAutomated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreBackground: Chemokine (C-X-C motif) ligand (CXCL9) has an important role recruiting the T-lymphocytes and immune response after infection by inducing T-cells accumulation around the areas associated with infections. However, this role is poorly known in relation with Toxoplasma gondii infection and also in association with thyroid hormones, which the present study is focused on. Methods: Eighty-seven women were included in this study for the period between September 2021 and February 2022. Blood samples of uninfected healthy pregnant, in addition to aborted and pregnant women infected with toxoplasmosis, were collected. Sera were then obtained and stored at -10°C. Toxo-latex agglutination test was done, followed by detec
... Show MoreBackground: Chemokine (C-X-C motif) ligand (CXCL9) has an important role recruiting the T-lymphocytes and immune response after infection by inducing T-cells accumulation around the areas associated with infections. However, this role is poorly known in relation with Toxoplasma gondii infection and also in association with thyroid hormones, which the present study is focused on.
Methods: Eighty-seven women were included in this study for the period between September 2021 and February 2022. Blood samples of uninfected healthy pregnant, in addition to aborted and pregnant women infected with toxoplasmosis, were collected. Sera were then obtained and stored at -10°C. Toxo-latex a
... Show MoreThis paper presents a comparison study on thermal performance conic cut twist tape inserts in laminar flow of nanofluids through a constant heat fluxed tube. Three tape configurations, namely, quadrant cut twisted tape (QCT), parabolic half cut twisted tape (PCT), and triangular cut twisted (VCT) of twist ratio= 2.93 and cut depth= 0.5 cm were used with 1% and 2% volume concentration of SiO2/water and TiO
... Show More