In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated through the strain profiles, stress distribution, normal force-axial strain, and moment-curvature relationships, shows that the numerical model has good numerical accuracy and is capable of predicting the behavior of structural concrete members with different partially prestressing ratios at serviceability and ultimate loading stages.
The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MorePredicting permeability is a cornerstone of petroleum reservoir engineering, playing a vital role in optimizing hydrocarbon recovery strategies. This paper explores the application of neural networks to predict permeability in oil reservoirs, underscoring their growing importance in addressing traditional prediction challenges. Conventional techniques often struggle with the complexities of subsurface conditions, making innovative approaches essential. Neural networks, with their ability to uncover complicated patterns within large datasets, emerge as a powerful alternative. The Quanti-Elan model was used in this study to combine several well logs for mineral volumes, porosity and water saturation estimation. This model goes be
... Show MoreTelevision white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba
... Show MoreThe goal of this investigation is to prepare zinc oxide (ZnO) nano-thin films by pulsed laser deposition (PLD) technique through Q-switching double frequency Nd:YAG laser (532 nm) wavelength, pulse frequency 6 Hz, and 300 mJ energy under vacuum conditions (10-3 torr) at room temperature. (ZnO) nano-thin films were deposited on glass substrates with different thickness of 300, 600 and 900 nm. ZnO films, were then annealed in air at a temperature of 500 °C for one hour. The results were compared with the researchers' previous theoretical study. The XRD analysis of ZnO nano-thin films indicated a hexagonal multi-crystalline wurtzite structure with preferential growth lines (100), (002), (101) for ZnO nano-thin films with different thi
... Show MoreThis study is dedicated to one of the most difficult topics in Russian - this is the science of idioms. A feature of the Russian speech application in recent decades has been the effective change in the lexical composition of the Russian language. This article illustrates the semantic, grammatical and stylistic structural characteristics of the linguistic units that appeared in Russian at the end of the 20th century - the beginning of the twenty-first century. This work defines these terms : terminology, linguistic unity, and terms that are used as synonyms. In this research , we will adhere to the conciliatory view of the problem and include not only the terminology in the language units, but also the terminological compositions, saying
... Show Moreفي هذا البحث تم تحضير المركبات المعدنية الجديدة لأيونات البلاتين (الرباعي) و الذهب (الثلاثي) مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين . تم استخدام المعقدات بعد ذلك كمصدر لتحضير جزيئات عن طريق ترسيب المعقدات على مسام دقائق السيليكا النانوية. Si/Au2O3 Si/PtO2 تم تشخيص الليكاند و معقداته
... Show More