A novel demountable shear connector for precast steel-concrete composite bridges is presented. The connector uses high-strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents bolts from slipping within their holes. Moreover, the connector promotes accelerated construction and overcomes the typical construction tolerance issues of precast structures. Most importantly, the connector allows bridge disassembly. Therefore, it can address different bridge deterioration scenarios with minimum disturbance to traffic flow including the following: (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, whereas precast decks and shear connectors can be reused. A series of push-out tests are conducted to assess the behavior of the connector and quantify the effect of important parameters. The experimental results show shear resistance, stiffness, and slip capacity significantly higher than those of welded shear studs along with superior stiffness and strength against slab uplift. Identical tests reveal negligible scatter in the shear load-slip displacement behavior. A design equation is proposed to predict the shear resistance with absolute error less than 8%.
Perimenopausal bleeding, is a very common problem, which is an alarming symptom for both; women and their doctors because of the rising fears of cellular changes or tumor of endometrium. In our study we tried to prove that collecting endometrial samples using the outpatient method of Pipelle is as effective as collecting the endometrial samples in the traditional method of Dilation and Curettage (DandC) in operation theatre which necessitates general anesthesia. Ninety four patients more than 40 years old were included in the study, all of them were complaining of abnormal uterine bleeding (pregnant ladies and ladies using hormonal contraception were excluded from the study) and endometrial samples were collected first in outpatient
... Show MoreThe design of reinforced concrete spread foundations mainly depends on soil bearing capacity, loading value, and column size. So for each design case, tiresome calculations and time consumption are needed. In this paper, generalized design charts are presented and plotted according to derivations based on the ACI 318 M-2019 Code. These charts could be used directly by the structural designers to estimate the column size, foundation thickness, and dimensions as well as the foundation reinforcement under a certain given concentric load assuming a uniformly distributed contact pressure underneath the foundation. Of noteworthy, these charts are oriented to deal with square isolated footings with a square concentric column, covering reasonable r
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThis research presents a response surface methodology (RSM) with I‐optimal method of DESIGN EXPERT (version 13 Stat‐Ease) for optimization and analysis of the adsorption process of the cyanide from aqueous solution by activated carbon (AC) and composite activated carbon (CuO/AC) produced by pyro carbonic acid microwave using potato peel waste as raw material. Pyrophosphate 60% (wt) was used for impregnation with an impregnation ratio 3:1, impregnation time of 4 h at 25°C, radiant power of 700 W, and activation time of 20 min. Batch experiments were conducted to determine the removal efficiency of cyanide from aqueous solution to evaluate the influences of various experimental parameters su
Binary mixtures of three heavy oil-stocks had been subjected to density measurments. The data had been aquired on the volumetric behaviour of these systems. The heavy oil-stocks used were of good varity, namely 40 stock , 60 stock, and 150 stock, 40 stock is the lightest one with the API gravity 33.7 while 60 stock is middle type and 150 stock is heavy one, with API gravity 27.7 and 23.8 respectively. Stocks with Kerosene or Xylene for non-ideal mixtures for which excess volume can be positive or negative. Mixture of heavy-oil stocks with paraffinic spike (Kerosene) show negative excess volume. While, aromatic rings results a lower positive excess volume, as shown in Xylene when blending with 40 stock and 60 stock but a negati
... Show More