Research aims to develop a novel technique for segmental beam fabrication using plain concrete blocks and externally bonded Carbon Fiber Reinforced Polymers Laminates (CFRP) as a main flexural reinforcement. Six beams designed an experimentally tested under two-point loadings. Several parameters included in the fabrication of segmental beam studied such as; bonding length of carbon fiber reinforced polymers, the surface-to-surface condition of concrete segments, interface condition of the bonding surface, and thickness of epoxy resin layers. Test results of the segmental beams specimens compared with that gained from testing reinforced concrete beam have similar dimensions for validations. The results show the effectiveness of the developed fabrication method of segmental beams. The modified design procedure for externally bonded carbon fiber reinforced polymers ACI 440.2R-17 developed for designing segmental beams. The experimental test values also compared with design values and it was 93.3% and 105.8% of the design values which indicates the effectiveness of the developed procedure.
Background. Nanocoating of biomedical materials may be considered the most essential developing field recently, primarily directed at improving their tribological behaviors that enhance their performance and durability. In orthodontics, as in many medical fields, friction reduction (by nanocoatings) among different orthodontic components is considered a substantial milestone in the development of biomedical technology that reduces orthodontic treatment time. The objective of the current research was to explore the tribological behavior, namely, friction of nanocoated thin layer by tantalum (Ta), niobium (Nb), and vanadium (V) manufactured using plasma sputtering at 1, 2, and 3 hours on substrates made of 316L stainless steel (SS),
... Show MoreGrowth of Penicillium expansum, an ubiquitous mould found in stored fruit globallyt, was significantly restricted by exposure to 48 h cell-free supernatant of two strains of Lactobacillus plantarum (p < 0.001). In addition, the biotransformation of patulin, a toxic secondary metabolite formed by P. expansum, on exposure to L. plantarum cells and cell-free supernatant highlights the potential of this GRAS microbe as a biocontrol agent. Up to 80% of patulin was biotransformed following a 4 h incubation with 1010 cells ml−1 (37 °C) forming E- and Z-ascladiol. The formation of these products was more pronounced at elevated pH and cell density. Exposure to cell free supernatant or sonicated cells resulted in complete patulin biotransformation
... Show MoreDrug resistance is a hot topic issue in cancer research and therapy. Although cancer therapy including radiotherapy and anti‐cancer drugs can kill malignant cells within the tumor, cancer cells can develop a wide range of mechanisms to resist the toxic effects of anti‐cancer agents. Cancer cells may provide some mechanisms to resist oxidative stress and escape from apoptosis and attack by the immune system. Furthermore, cancer cells may resist senescence, pyroptosis, ferroptosis, necroptosis, and autophagic cell death by modulating several critical genes. The development of these mechanisms leads to resistance to anti‐cancer drugs and also radiotherapy. Resistance to therapy can increase mortal
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
This paper aims to prove an existence theorem for Voltera-type equation in a generalized G- metric space, called the -metric space, where the fixed-point theorem in - metric space is discussed and its application. First, a new contraction of Hardy-Rogess type is presented and also then fixed point theorem is established for these contractions in the setup of -metric spaces. As application, an existence result for Voltera integral equation is obtained.
The convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog
... Show MoreThe COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More