Current numerical research was devoted to investigating the effect of castellated steel beams without and with strengthening. The composite concrete asymmetrical double hot rolled steel channels bolted back to back to obtain a built-up I-shape form are used in this study. The top half part of the steel is smaller than the bottom half part, and the two parts were connected by bolting and welding. The ABAQUS/2019 program employed the same length and conditions of loading for four models: The first model is the reference without castellated and strengthening; the second model was castellated without strengthened; the third model was castellated and strengthened with reactive powder concrete encased in the steel web, and the fourth model was castellated and strengthened with reactive powder concrete and lacing steel rebar's welded diagonally on two sides of the steel web. According to the Numerical results, there was an increase in ultimate load capacity compared to the reference model of about 22.74%, 51.65%, and 77.98% in the second, third, and fourth models, respectively; also, there is a reduction in deflection of 55.52%, 58.74, and 60.55% in the second, third, and fourth models, respectively, compared to the level deflection at ultimate load for the reference model, with an increase in stiffness and ductility. In comparison to the I section, the fabrication of a castellated steel beam from the double channel is more cost-effective in terms of cutting steel loss at the ends of the castellated beam, this is due to the feature of rotation and reflection of the steel channel section during cutting and forming to castellated shape.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreThe radio drama is considered to be one of the arts that is discovered after a long period of theater's discovery. Initially , it was the broad framework of the theater's work when radio was broadcasting the shows on the huge theaters. This beginning encouraged many of the radio specialists to correlate plays with radio and make a novice and distinctive type of art. Thus, radio drama made its first step including the following ( plays, short and long series drama as well as other types of radio arts). Because of the above mentioned , the researcher is stimulating to study directing techniques to process the radio drama script ( Khata'a play as a sample).
The first chapter deals with the
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreThroughout this paper we study the properties of the composition operator
C
p1 o
p2 o…o
pn induced by the composition of finite numbers of special
automorphisms of U,
pi (z) i
i
p z
1 p z
Such that pi U, i 1, 2, …, n, and discuss the relation between the product of
finite numbers of automorphic composition operators on Hardy space H2 and some
classes of operators.
Seventy five E. coli isolates were collected from urine of patients with urinary tract infections in AL-Kadhimia and AL-Yarmook teaching hospitals in Baghdad for a period between 22/11/2009 to 15/3/2010, from these samples twenty five isolates were selected according to their pattern of the highest resistance as these showing multi-drug resistances and tested to specify their minimum inhibitory concentration for (meropenem, gentamicin and amikacin), meropenem was found having the lowest MIC comparing with others. This study also includes in vitro effects of various combinations of three types of antimicrobials (meropenem, gentamicin and amikacin) against twenty five E. c
... Show More