Two novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast decks and shear connectors can be reused. A series of push-out tests and a beam test were conducted to assess the behavior of the connectors and quantify the effect of important parameters. The experimental results showed that shear resistance and slip capacity can reach 2.5 and 2.7 times respectively of those of welded shear studs along with superior stiffness and strength against slab uplift. Additionally, shear stiffness of M16 mm LNSC was equal to that of M19 mm welded studs. Identical tests reveal negligible scatter in the shear load – slip displacement behavior. Design equations are proposed to predict the shear resistance with minimum deviations.
In The Bluest Eye (1970) , Toni Morrison addresses a timeless problem of white racial dominance in the United States and points to the impact it has on the life of black females growing up in the 1930's. Morrison in this novel explores how Western standards of ideal beauty are created and propagated with and among the black community. The novel not only portrays the lives of those whose dark skinned and negroid features blight their lives; it also shows how the standards of white beauty are imposed on black youth to cause a damage of one's self-love and esteem which usually occurs when beauty goes unrecognized
Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreThin films of CuPc of various thicknesses (150,300 and 450) nm have been deposited using pulsed laser deposition technique at room temperature. The study showed that the spectra of the optical absorption of the thin films of the CuPc are two bands of absorption one in the visible region at about 635 nm, referred to as Q-band, and the second in ultra-violet region where B-band is located at 330 nm. CuPc thin films were found to have direct band gap with values around (1.81 and 3.14 (eV respectively. The vibrational studies were carried out using Fourier transform infrared spectroscopy (FT-IR). Finally, From open and closed aperture Z-scan data non-linear absorption coefficient and non-linear refractive index have been calculated res
... Show MoreThe rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme
The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreThe main objective of this paper is to determine an acceptable value of eccentricity for the satellites in a Low Earth Orbit LEO that are affected by drag perturbation only. The method of converting the orbital elements into state vectors was presented. Perturbed equation of motion was numerically integrated using 4th order Runge-Kutta’s method and the perturbation in orbital elements for different altitudes and eccentricities were tested and analysed during 84.23 days. The results indicated to the value of semi major axis and eccentricity at altitude 200 km and eccentricity 0.001are more stable. As well, at altitude 600 km and eccentricity 0.01, but at 800 km a
In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show More