This paper introduces an experimental study on the behavior of confined concrete filled aluminum tubular (CFT) column to improve strength design, ductility and durability of concrete composite structures under concentrically loaded in compression to failure. To achieve this: seven column specimens with same concrete diameter 100mm and without steel reinforcement have been examined through experimental testing, which are used to study the effects of the thickness of the aluminum tube encased concrete ( thickness : 0mm, 2mm, 3mm, 4mm and 5mm with same length of column 450mm), length of column (thickness 5mm and length of column 700mm) and durability (thickness 5mm and length of column 450mm) on the structural behavior of &
... Show MorePositron annihilation lifetime has been utilized for the first time to investigate the free - volume hole properties in thermolumenscent dosimeter ( TLD ) as a function of gamma-dosc . The hole volume, free volume fraction determined form orthopsitronium lifetime are found to be ?lamatically increase to large values , and then to minimum values as a function ofgamma-dose . The free - volume holes size is found to be 0.163nm’ and to have maximum of 0.166nm^ at the gamma-dose of 0.1 and 0.8 Gy, respectively-
Permeability estimation is a vital step in reservoir engineering due to its effect on reservoir's characterization, planning for perforations, and economic efficiency of the reservoirs. The core and well-logging data are the main sources of permeability measuring and calculating respectively. There are multiple methods to predict permeability such as classic, empirical, and geostatistical methods. In this research, two statistical approaches have been applied and compared for permeability prediction: Multiple Linear Regression and Random Forest, given the (M) reservoir interval in the (BH) Oil Field in the northern part of Iraq. The dataset was separated into two subsets: Training and Testing in order to cross-validate the accuracy
... Show MoreAs many expensive and invasive procedures are used for the diagnosis or follow-up of clinical conditions, the measurement of cell-free DNA is a promising, noninvasive method, which considers using blood, follicular fluid, or seminal fluid. This method is used to determine chromosomal abnormalities, genetic disorders, and indicators of some diseases such as polycystic ovary syndrome, pre-eclampsia, and some malignancies. Cell-free DNA, which are DNA fragments outside the nucleus, originates from an apoptotic process. However, to be used as a marker for the previously mentioned diseases is still under investigation. We discuss some aspects of using cell-free DNA measurements as an indicator or marker for pathological conditions.
A theoretical analysis of mixing in the secondary combustion chamber of ramjet is presented. Theoretical investigations were initiated to insight into the flow field of the mixing zone of the ramjet combustor and a computer program to calculate axisymmetric, reacting and inert flow was developed. The mathematical model of the mixing zone of ramjet comprises differential equations for: continuity, momentum, stagnation enthalpy, concentration, turbulence energy and its dissipation rate. The simultaneous solution of these equations by means of a finite-difference solution algorithm yields the values of the variable at all internal grid nodes.
The results showed that increasing air mass flow (0.32 to 0.64 kg/s) increases the development o
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More