A novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIR, MIR, UV – Visible spectra have been studied for Cobalt chloride molecule (CoCl2. 6H2O) compound, In wide range spectra (40000 – 410) cm-1 specially MIR range. Assignment were achieved for the fundamental vibrational bands of (CoCl2 . 6H2O ) to symmetry stretching ?1 (?^+) Anti – symmetry stretching ?3(?^+), these bands are non-degenerate , and the bending band is ?2(?) is doubly degenerate thought they have activity in IR and Raman , which explain the weakness in symmetry of this molecule, the fundamental bands for the molecule are centered at the following wave numbers (615, 685, 795, 1115, 1340, 1375, 1616.35, 2091, 2386, 2410, 3364) cm-1 which are corresponding to wave lengths (16260, 14598, 12578, 8968, 7462, 7272, 6186,
... Show MoreA new method is characterized by simplicity, accuracy and speed for determination of Oxonuim ion in ionisable inorganic acid such as hydrochloric (0.1 - 10) ,Sulphuric ( 0.1 - 6 ),nitric ( 0.1 - 10 ), perchloric ( 0.1 - 7 ), acetic (0.1 - 100 ) and phosphoric ( 0.1 - 30 ) ( mMol.L-1 )acids. By continuous flow injection analysis. The proposed method was based on generation of bromine from the Bro-3-Br-- H3O+. Bromine reacts with fluorescein to quenches the fluorescence . A sample volume no.1 (31μl) and no.2 (35μl) were used with flow rate of 0.95 mL.min-1 using H2O line no.1as carrier stream and 1.3 mL.min-1 using fluorescein sodium salt line no.2. Linear regression of the concentration ( mMol.L-1 ) Vs quenched fluorescence gives a correla
... Show More