This research presents an experimental investigation of the rehabilitation efficiency of the damaged hybrid reinforced concrete beams with openings in the shear region. The study investigates the difference in retrofitting ability of hybrid beams compared to traditional beams and the effect of two openings compared with one opening equalized to two holes in the area. Five RC beams classified into two groups, A and B, were primarily tested to full-failure under two-point loads. The first group (A) contained beams with normal weight concrete. The second group (hybrid) included beams with lightweight concrete for web and bottom flange, whereas the top flange was made from normal concrete. Two types of openings were considered in this study, rectangular, with dimensions of 100×200 mm, and two square openings with a side dimension of 100 mm. A full wrapping configuration system for the shear region (failure zone) was adopted in this research. Based on the test results, the repaired beams managed to recover their load carrying capacity, stiffness, and structural performance in different degrees. The normal concrete beam regains its total capacity for all types of openings, while the hybrid beams gain 84% of their strength. The strength of hybrid concrete members compared with normal concrete is 81 and 88% for beams of one opening and two openings, respectively. Doi: 10.28991/CEJ-2022-08-01-012 Full Text: PDF
The rapid development of Internet of Things (IoT) devices and their increasing numbers have caused a tremendous increase in network traffic and a wider range of cyber-attacks. This growing trend has complicated the detection process for traditional intrusion detection systems and heightened the challenges faced by these devices, such as imbalanced and large training data. This study presents a cohesive methodology of a series of intelligent techniques to prepare clean and balanced data for training the first (core) layer of a robust hierarchical intrusion detection system. The methodology was built by cleaning and compressing the data using an Autoencoder and preparing a strong latent space for balancing using a hybrid method that combines
... Show MoreBackground: Errors of horizontal condylar inclinations and Bennett angles had largely affected the articulation of teeth and the pathways of cusps. The aim of this study was to estimate and compare between the horizontal condylar (protrusive) angles and Bennett angles of full mouth rehabilitation patients using two different articulator systems. Materials and Methods: Protrusive angles and Bennett angles of 50 adult males and females Iraqi TMD-free full mouth rehabilitation patients were estimated by using two different articulator systems. Arbitrary hinge axis location followed by protrusive angles and Bennett angles, estimation was done by a semiadjustable articulator system. A fully adjustable articulator system was utilized to locate th
... Show MoreBackground/: Buccal tubes are orthodontic attachments used on the posterior teeth instead of bands, so it is important to focus on the effect of their properties on orthodontic treatment. The aims of the present in vitro study are to evaluate and compare the buccal tube front and back openings dimensions and the torsional play angle of six different brands. Materials and Methods: The samples consisted of Single bondable, non-convertible first molar buccal tubes from six brands supplied from six companies (Dentaurum, Forestadent, Ormco, 3M, American Orthodontic, A-Star). Regarding tube opening dimension, ten buccal tubes of each brand were examined by an optical microscope. Each tube was fixed during examination using synthetic mud and orie
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe aim of this investigation is to evaluate the experimental and numerical effectiveness of a new kind of composite column by using Glass Fiber‐Reinforced Polymer (GFRP) I‐section as well as steel I‐section in comparison to the typical reinforced concrete one. The experimental part included testing six composite columns categorized into two groups according to the slenderness ratio and tested under concentric axial load. Each group contains three specimens with the same dimensions and length, while different cross‐section configurations were used. Columns with reinforced concrete cross‐section (reference column), encased GFRP I‐section, and encased steel I‐section were adopted in each