Current numerical research was devoted to investigating the effect of castellated steel beams without and with strengthening. The composite concrete asymmetrical double hot rolled steel channels bolted back to back to obtain a built-up I-shape form are used in this study. The top half part of the steel is smaller than the bottom half part, and the two parts were connected by bolting and welding. The ABAQUS/2019 program employed the same length and conditions of loading for four models: The first model is the reference without castellated and strengthening; the second model was castellated without strengthened; the third model was castellated and strengthened with reactive powder concrete encased in the steel web, and the fourth model was castellated and strengthened with reactive powder concrete and lacing steel rebar's welded diagonally on two sides of the steel web. According to the Numerical results, there was an increase in ultimate load capacity compared to the reference model of about 22.74%, 51.65%, and 77.98% in the second, third, and fourth models, respectively; also, there is a reduction in deflection of 55.52%, 58.74, and 60.55% in the second, third, and fourth models, respectively, compared to the level deflection at ultimate load for the reference model, with an increase in stiffness and ductility. In comparison to the I section, the fabrication of a castellated steel beam from the double channel is more cost-effective in terms of cutting steel loss at the ends of the castellated beam, this is due to the feature of rotation and reflection of the steel channel section during cutting and forming to castellated shape.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show MoreDue to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.
In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
Efficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pres
... Show MoreTwo different polyvinyl alcohol/polyvinyl chloride (PVA/PVC) hollow fiber composite nanofiltration membranes were prepared after PVC hollow fiber membranes were coated using dip-coating method with PVA aqueous solution, which was composed of PVA, fatty alcohol polyoxyethylene ether (AEO9), and water [PVA/AEO9/water (4:0.5:95.5) wt%]. Effect of two different PVC hollow fiber immersion times in coating solution were studied. Cross-section, internal and external surfaces of the PVC hollow fibers and PVA/PVC composite nanofiltration membranes structures were characterized by scanning electron microscopy (SEM), pure water permeation flux and solutes rejection. It was found that, the coating layer thickness on the outer surface of the 19 wt% P
... Show MoreThe aim of this work is to study the influence of the type of fiber glass –mat on fatigue behavior of composite material which is manufactured from polyester and E-glass (woven roving, chopped strand mat (CSM)) as a laminate with a constant fiber volume fraction (VF) of 33%. The results showed that the laminates reinforced with E-glass (woven roving) [0/90, ±45.0/90] and [0/90, CSM, 0/90] have lower fatigue strength than the laminates reinforced with E-glass [0/90]3,[CSM]3 and [CSM, 0/90, CSM] although they had different tensile strength; the best laminate was [0/90]3 .
in the present article, we present the peristaltic motion of “Hyperbolic Tangent nanofluid” by a porous area in a two dimensional non-regular a symmetric channel with an inclination under the impact of inclination angle under the impact of inclined magnetic force, the convection conditions of “heat and mass transfer” will be showed. The matter of the paper will be further simplified with the assumptions of long wave length and less “Reynolds number”. we are solved the coupled non-linear equations by using technical analysis of “Regular perturbation method” of series solutions. We are worked out the basic equations of continuity, motion, temperature, and volume fraction
The second most commonly diagnosed cancer is colorectal cancer (CRC) is in female. The levels of progranulin, obestatin and liver enzymes including ALT, AST and ALP were measured in forty five sera in female patients suffering from CRC before chemotherapy initiation treatment as G1, G2 after first chemotherapy cycle and G3 after second chemotherapy cycle compared with thirty female as a healthy control G4. Results showed a high significant increased in progranulin concentration and a high significant decrease in obestatin in G2 than other groups. The correlation between progranulin and ALP was a significant negative (-ve) relation while obestatin with AST gave a significant positive (+ve) correlation in G. The results also showed non signif
... Show More