In this study, the flexural performance of a new composite beam–slab system filled with concrete material was investigated, where this system was mainly prepared from lightweight cold-formed steel sections of a beam and a deck slab for carrying heavy floor loads as another concept of a conventional composite system with a lower cost impact. For this purpose, seven samples of a profile steel sheet–dry board deck slab (PSSDB/PDS) carried by a steel cold-formed C-purlins beam (CB) were prepared and named “composite CBPDS specimen”, which were tested under a static bending load. Specifically, the effects of the profile steel sheet (PSS) direction (parallel or perpendicular to the span of the specimen) using different C-purlins configurations (double sections connected face-to-face, double separate sections, and a single section) were investigated. The research discussed the specimens’ failure modes, flexural behavior, bending capacity, bending strain relationships, and energy absorption index of specimens. Generally, the CBPDS specimens with the PSS slab placed in a parallel direction achieved approximately a 13–40% higher bending capacity compared with the corresponding specimens with a perpendicular PSS direction (depending on the configuration of the beam). Fabricating the beam of the CBPDS specimen with double C-purlins (face-to-face) led to more effective concrete confinement behavior compared with the double separate C-purlins beam. The related specimen recorded a 10% higher bending capacity. Finally, the suggested composite CBPDS system exhibited a sufficient energy absorption capability of the static bending load because it demonstrated high strength and high ductility.
The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var
... Show MoreSteady natural convection in a square enclosure with wall length (L= 20 cm) partially filled by saturated porous medium with same fluid (lower layer) and air (upper layer) is investigated. The conceptual study of the achievements of the heat transfer is performed under effects of bottom heating by constant heat flux (q=150,300,450,600W/m2 ) for three heaters size (0.2,0.14,0.07)m with symmetrically cooling with constant temperature on two vertical walls and adiabatic top wall. The relevant filled studied parameters are four different porous medium heights (Hp=0.25L,0.5L, 0.75L, L), Darcey number (Da1) 3.025×10-8 and (Da2) 8.852×10-4 ) and Rayleigh number range (60.354 - 241.41), (1.304×106 – 5.2166×106 ) for Da1 and Da2 cases respecti
... Show MoreNonlinear diffraction patterns can be obtained by focusing a laser beam through a thin slice of the material. Here, we investigated experimentally the formation of the far field nonlinear diffraction patterns of cw laser beam at 532 nm passing through a quartz cuvette containing multi-wall carbon nanotubes (MWCNT's) suspended in acetone and in DI water at concentrations of 0.030.wt.%, 0.045 wt.%, 0.060 wt.%, and 0.075 wt.%. Our results show that increasing the concentration of both types of suspensions (MWCNTs in acetone and MWCNTs DI water) led to increase in the number of pattern rings which indicates an increase in their nonlinear refractive indices. Moreover, MWCNTs DI water suspension at a concentration of 0.075 wt. % was more effic
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More