In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated through the strain profiles, stress distribution, normal force-axial strain, and moment-curvature relationships, shows that the numerical model has good numerical accuracy and is capable of predicting the behavior of structural concrete members with different partially prestressing ratios at serviceability and ultimate loading stages.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreThe pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed
A polycrystalline CdTefilms have been prepared by thermal evaporation technique on glass substrate at room temperature. The films thickness was about700±50 nm. Some of these films were annealed at 573 K for different duration times (60, 120 and 180 minutes), and other CdTe films followed by a layer of CdCl2 which has been deposited on them, and then the prepared CdTe films with CdCl2 layer have been annealed for the same conditions. The structures of CdTe films without and with CdCl2 layer have been investigated by X-ray diffraction. The as prepared and annealed films without and with CdCl2 layer were polycrystalline structure with preferred orientation at (111) plane. The better structural pr
... Show MoreIn this paper, we used two monomers, 3,3',4,4'-benzophenone tetracarboxylic dianhydride (BTDA) and m,m'-diaminobenzophenone (m, m’-DABP), to produce polyamide acid and then converted it to polyimide (PI). The effects of phosphoric acid (H3PO4) molarity (1, 2, and 3 M) on the structural, thermal, mechanical, and electrical characteristics of the polyimides/polyaniline (PI/PANI) nanocomposites were studied. Two sharp reflection peaks were developed by the addition of PANI to PI. When 3 M H3PO4 is added, the crystalline sharp peak loses some of its intensity. The complex formation of PI/PANI-H3PO4 was confi
... Show MoreIn this work, two graphene oxide (GO) samples were prepared using the Hummers method with graphite (g) and KMnO4 (g) ratios of 1:3 (GO3) and 1:6 (GO6). The effect of oxidation degree on the structural, electrical, and dielectric properties of the GO samples was investigated. The structures of the GO samples were studied using various techniques, including X-ray diffraction (XRD), Fourier transform infrared (FT-IR) spectroscopy, scanning electron microscopy (SEM), and energy-dispersive X-ray spectroscopy (EDXS). XRD analysis revealed an increase in the interlayer spacing and a decrease in the number of layers of the samples with increasing oxidant content. The two GO samples have giant permittivity values of ~105 in the low-frequency
... Show More