Incorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight concrete performed similarly to conventional concrete when used as a filler material in composite steel tube beams. The structural effects of sawdust substitution on ultimate load and initial stiffness were less substantial than the relative changes in the material properties, and the ultimate capacity of the tested samples decreased moderately as the substitution percentage of sawdust increased. Moreover, the maximum load capacity was observed to decrease by 6.43–30.71% for sawdust replacement levels between 5% and 45.1% across all tested samples. Additionally, when using lightweight concrete with 5% sawdust, the moment value of the CFST sample was reduced by 6.4%. Notably, the sawdust CFST samples exhibited a flexural behavior that was relatively comparable to that of the standard CFST samples.
The study highlighted the transformation of value systems and educational patterns between past and present, especially with the introduction of modern variables and means, such as mobile phones, the internet, social media, and others. These factors have contributed both positively and negatively to the study. The study highlights the integral role of the school in collaboration with the family in guiding and educating children. It also emphasizes the active role of the school in developing students' abilities and skills, either attracting them to school or vice versa. This includes an examination of the essential skills required in education and their role in achieving a state of psychological well-being and systematically developing child
... Show MoreNumerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)2 (μ3-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density
... Show MorePraise be to God who created the soul, perfected it, and inspired it with its immorality and piety. He says in His Noble Book: ﭤ Fajr: 27-30 Glory be to You, O God! O Lord, on whom I have chosen for You as a beloved from myself and the soul of the two worlds, may our master Muhammad be sacrificed for him, who enlightened the horizons with his introduction to enlightenment. It soon ends with the end of pleasure, which is the opposite of the pleasure of thought and meaning, as it is permanent and continuous, and from here we see that the Messenger of God, may God’s prayers and peace be upon him, urges us in various places to seek knowledge and fortify the soul and thought in a way that raises one’s status and protects him from the st
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.
As a result of recent developments in highway research as well as the increased use of vehicles, there has been a significant interest paid to the most current, effective, and precise Intelligent Transportation System (ITS). In the field of computer vision or digital image processing, the identification of specific objects in an image plays a crucial role in the creation of a comprehensive image. There is a challenge associated with Vehicle License Plate Recognition (VLPR) because of the variation in viewpoints, multiple formats, and non-uniform lighting conditions at the time of acquisition of the image, shape, and color, in addition, the difficulties like poor image resolution, blurry image, poor lighting, and low contrast, these
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More