Preferred Language
Articles
/
joe-1668
Silica Fume Modified Cement-Based Mortar Exposed to High Temperatures: Residual Strengths and Microstructure
...Show More Authors

Several previous investigations and studies utilized silica fume (SF) or (micro silica) particles as supplementary cementitious material added as a substitute to cement-based mortars and their effect on the overall properties, especially on physical properties, strength properties, and mechanical properties. This study investigated the impact of the inclusion of silica fume (SF) particles on the residual compressive strengths and microstructure properties of cement-based mortars exposed to severe conditions of elevated temperatures. The prepared specimens were tested and subjected to 25, 250, 450, 600, and 900 °C. Their residual compressive strengths and microstructure were evaluated and compared with control samples (CS) subjected to similar conditions (the same temperature category). The outcomes indicated that including silica fume particles in mortar mixtures lowered the amount and width of microcracks, upgraded the mass-loss performance, lowered crystalline calcium hydroxide, and reinforced the cement paste, which explained the improvement in residual mechanical strengths.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Fri Jun 02 2023
Journal Name
East European Journal Of Physics
Electroexcitation Form Factors and Deformation of 20,22Ne Isotopes Based on the Shell Model and Hartree-Fock plus BCS Calculations
...Show More Authors

Nuclear structure of 20,22Ne isotopes has been studied via the shell model with Skyrme-Hartree-Fock calculations. In particular, the transitions to the low-lying positive and negative parity excited states have been investigated within three shell model spaces; sd for positive parity states, spsdpf large-basis (no-core), and zbme model spaces for negative parity states. Excitation energies, reduced transition probabilities, and elastic and inelastic form factors were estimated and compared to the available experimental data. Skyrme interaction was used to generate a one-body potential in the Hartree-Fock calculations for each selected excited states, which is then used to calculate the single-particle matrix elements. Skyrme interac

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 13 2024
Journal Name
Journal Of Robotics
Hierarchical Stabilization and Tracking Control of a Flexible-Joint Bipedal Robot Based on Anti-Windup and Adaptive Approximation Control
...Show More Authors

Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv

... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 29 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Design and Development of Powerful Neuroevolution Based Optimized GNNBiLSTM Model for Consumer Behaviour and Effective Recommendation in Social Networks
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
Bullying and its relation to parental treatment style
...Show More Authors

The current research aims to know the relationship between bullying and parental treatment. (200) pupils were selected randomly from the fifth and sixth grades of primary schools.

Two instruments were used. The first was to measure bullying and it included 19 items. To measure parental treatment, the researchers adopted (Aletaby 2001) scale.

Statistical analysis showed that correlation between bullying , wiggle and Firm treatment style was positive Statistically significant .Bulling was correlated negatively with (neglect, careless, and Authoritarian treatment style.

View Publication Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct

... Show More
View Publication Preview PDF
Crossref (30)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Indian Journal Of Ecology
Evaluation of maize hybrids, their inbred lines and estimation of genetic divergence based on cluster analysis
...Show More Authors

Scopus (4)
Scopus
Publication Date
Mon Oct 01 2018
Journal Name
Ieee Transactions On Network Science And Engineering
A Resource Allocation Mechanism for Cloud Radio Access Network Based on Cell Differentiation and Integration Concept
...Show More Authors

View Publication
Crossref (16)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Electrical Engineering
A Method Combining Compressive Sensing-Based Method of Moment and LU Decomposition for Solving Monostatic RCS
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jun 09 2020
Journal Name
Article In Journal Of Engineering Science And Technology
English Numbers Recognition Based on Sign Language Using Line-Slope Features and PSO-DBN Optimization Method
...Show More Authors

View Publication
Scopus (3)
Scopus