This paper presents a nonlinear finite element modeling and analysis of steel fiber reinforced concrete (SFRC) deep beams with and without openings in web subjected to two- point loading. In this study, the beams were modeled using ANSYS nonlinear finite element
software. The percentage of steel fiber was varied from 0 to 1.0%.The influence of fiber content in the concrete deep beams has been studied by measuring the deflection of the deep beams at mid- span and marking the cracking patterns, compute the failure loads for each deep beam, and also study the shearing and first principal stresses for the deep beams with and without openings and with different steel fiber ratios. The above study indicates that the location of openings and the amount steel fiber are affects to the behavior and strength of deep beams. And also when the results of the experiments taken from the literature were compared with the results obtained from the beam modeled with ANSYS finite element program, it was shown that the results of computer model gave similar results to the experimental behavior.
Proxy-based sliding mode control PSMC is an improved version of PID control that combines the features of PID and sliding mode control SMC with continuously dynamic behaviour. However, the stability of the control architecture maybe not well addressed. Consequently, this work is focused on modification of the original version of the proxy-based sliding mode control PSMC by adding an adaptive approximation compensator AAC term for vibration control of an Euler-Bernoulli beam. The role of the AAC term is to compensate for unmodelled dynamics and make the stability proof more easily. The stability of the proposed control algorithm is systematically proved using Lyapunov theory. Multi-modal equation of motion is derived using the Galerkin metho
... Show MoreThe study was conducted at the fields of the Department of Horticulture and Landscape Gardening, College of Agriculture Engineering Sciences, University of Baghdad. During the spring 2017. All the recommended practices were followed during experimentation. The experimental material consisted four Genotype it is Batraa, Btera, Mosulle, and local selection. The experiment was applied in Randomized Complete Block Design (RCBD). The objectives of Study were to estimate the some genetic parameters and path coefficient for some traits Okra, The results of statistical analysis for these genotypes were highly significant differences for all traits except the traits number of leaves, the numbe
This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta
... Show MoreEverybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreGalvanic corrosion of stainless steel 316 (SS316) and carbon steel (CS) coupled in 5% wt/v sulfuric acid solution at agitation velocity was investigated. The galvanic behavior of coupled metals was also studied using zero resistance ammeter (ZRA) method. The effects of agitation velocity, temperature, and time on galvanic corrosion current and loss in weight of both metals in both free corrosion and galvanic corrosion were investigated. The trends of open circuit potential (OCP) of each metal and galvanic potential (Eg) of the couple were, also, determined. Results showed that SS316 was cathodic relative to CS in galvanic couple and its OCP was much more positive than that of CS for all investigated ranges of
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreArtificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show More