In this investigative endeavor, a novel concrete variety incorporating sulfur-2,4-dinitrophenylhydrazine modification was developed, and its diverse attributes were explored. This innovative concrete was produced using sulfur-2,4-dinitrophenylhydrazine modification and an array of components. The newly created sulfur-2,4-dinitrophenylhydrazine modifier was synthesized. The surface texture resulting from this modifier was examined using SEM and EDS techniques. The component ratios within concrete, chemical and physical traits derived from the sulfur-2,4-dinitrophenylhydrazine modifier, chemical and corrosion resistance of concrete, concrete stability against water absorption, concrete resilience against freezing, physical and mechanical properties, durability, elastic modulus, and thermal expansion coefficient of the examined sulfur-infused concrete were assessed. The acquired results also substantiated that the thermal expansion coefficient value for sulfur-2,4-dinitrophenylhydrazine modified concrete was 14.8×10-6/0C. The average deformation of the analyzed concrete was 0.0026-0.0051, indicating a superior deformation performance compared to conventional concretes. Concrete with smaller aggregate sizes exhibited greater density, specifically 2283 kg/m3. The concrete density decreased gradually with an increase in aggregate size. The stability of sulfur-2,4-dinitrophenylhydrazine modified concrete was remarkably high in various aggressive environments. EDS analysis revealed that carbon atoms constituted 56.63% of the total mass, while sulfur made up 33.91% of the total mass. The obtained SEM outcomes demonstrated that the sulfur-2,4-dinitrophenylhydrazine modifier exhibited a more porous structure, devoid of crystalline formations. The sulfur-2,4-dinitrophenylhydrazine modification experienced a single-stage thermal mass loss, with the mass loss events being endothermic in nature. The IR findings verified the presence of amino functional groups (connected melamine ring) and the establishment of polymer sulfur chains.
The research aims to study the corrosion of aluminum alloy(6061) in 0.6 mol. dm-3 NaCl solution in base medium was examined with out and with Gallic acid as environmentally – friendly corrosion inhibitor at temperature range (298-313)K. The inhibitive action of gallic acid on corrosion of aluminum alloy(6061) in KOH solution was examined through electrochemical polarization method using potentiostatic technique and surface analysis by optical microscopy, Polarization measurements indicate that the examined compound act as a mixed type inhibitor. Results appeared that the inhibition occurs through adsorption of the inhibitor molecules on the metal surface and it was obeyed
... Show MoreWaste materials might be utilized in various applications, such as sustainable roller compacted concrete pavements (RCCP), to lessen the negative environmental consequences of construction waste. The impacts of utilizing (brick, thermostone, granite, and ceramic) powders on the mechanical characteristics of RCCP are investigated in this study. To achieve this, the waste materials were crushed, grounded, and blended before being utilized as filler in the RCCP. After the mixes were prepared, compressive strength, splitting tensile strength, flexural strength, water absorption, density, and porosity were all determined. According to the research results, adding some of these powders, mainly brick and granite powder, enhances the mechanical
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More