Slurry infiltrated fibrous concrete (SIFCON) is a modern type of fibre reinforced concrete (FRC). It has unique properties; SIFCON is superior in compressive strength, flexural strength, tensile strength, impact resistance, energy absorption and ductility. Because of this superiority in these characteristics, SIFCON was qualified for applications of special structures, which require resisting sudden dynamic loads such as explosions and earthquakes. The main aim of this investigation is to determine the effect of fibre type on the apparent density of SIFCON and on performance under impact load. In this investigation, hook-end steel fibre and polyolefin fibre were used. Purely once and hybrid in different portions again. After reviewing previous research, including [1, 2, 3] references three trail mixes were tested with a volume fraction of fibres (4, 6 and 8)%, and after testing them, a volume fraction of 6% was chosen. We chose the volume fraction of 6% and made the type of fibre the variable for comparison in this research. In hybrid fibres this fraction was divided once 2/3 steel fibres with 1/3 polyolefin fibres and vice versa. The specimens of the Impact resistance test were made with two specimens for each series, which are panels with dimensions of 50×50×5 cm. Three cubes were made for each series in the SIFCON apparent density test. Test results prove SIFCON produced from 2/3 polyolefin and 1/3 steel fibres achieved a good density reduction that contributes to reducing the self-weight of the structural element, which is a major aim in this investigation, reducing cost and maintaining high impact resistance.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MorePraise be to God, and may blessings and peace be upon our master and Prophet Muhammad and those who follow him, and may God be pleased with him
Taha is my guardian and whoever follows their path until the Day of Judgment. And after... The book (The Treasure in the Ten Recitations), written by Abu Muhammad Abdullah bin Abd al-Wasiti, who died in the year 710 AH, is considered one of the important books in recitations: because it included the universal custom that it contained in the books Al-Taysir by Al-Dani and Al-Irshad by Al-Falanisi, as the first of them was specialized.
Satisfy the second with the ten readings
May God bless my time, through His grace and generosity, to achieve this treasure and to publish it
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show More