This study investigated the shear performance of concrete beams with GFRP stirrups vs. traditional steel stirrups. Longitudinal glass fiber‐reinforced polymer (GFRP) bars were used to doubly reinforce the tested beams at both the top and bottom of their cross sections. To accomplish this, several stirrup spacings were provided. Eight beam specimens, measuring 300 × 250 × 2400 mm, were used in an experimental program to test under a two‐point concentrated load with an equal span‐to‐depth ratio until failure. Four beams in Group I have standard mild steel stirrups of 8 mm diameter, while four beams in Group II have GFRP stirrups with the same adopted diameter. The difference between the beams in each group was mainly due to the spacing between the reinforcing stirrups in the constant shear and pure bending spans. The test matrix consists of two beams with shear reinforcement equally distributed at 100 mm and 200 mm in constant shear and pure bending spans, respectively. Stirrups were placed uniformly over the whole effective span of the other six beams. In two beams, stirrups were placed 100 mm apart; in the other two, 75 mm; and in the last two, 50 mm. Test outcomes showed that GFRP stirrups, as opposed to steel stirrups, decreased the ultimate load by around 8%–27% based on stirrup spacing, while reducing the stirrup spacing increased the shear capacity. Also, the presence of compression GFRP bars and GFRP stirrups in the pure bending span led to an increase in the flexural stiffness of the tested beams. Consequently, this increase contributed to a higher ductility index. Accordingly, it is essential to prioritize adequate shear strength above flexural strength when designing GFRP‐reinforced concrete beams, as evidenced by the continuous observation of flexure‐shear cracking as the primary mode of failure in almost all tested beams.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis experiment presented essential oils by GC/MS, pigment content, and their antioxidant activities as well as sensory evaluation of delight samples. Limonene (66.88%) was the most prevalent yield. The peels of clementine had DPPH and ABT Scavenging activity. All levels of pigment extract had better scores for all sensory values and recorded acceptable scores in terms of appearance, color, aroma, and overall acceptability compared to control delight. Besides, delight samples containing 15 mg astaxanthin pigment extract showed maximum sensory scores compared to other samples and control delight. On the other hand, the product was less acceptable to the panelists compared to control in the case of the addition of 3.75 mg astaxanthin pigme
... Show More