In this paper, a new equivalent lumped parameter model is proposed for describing the vibration of beams under the moving load effect. Also, an analytical formula for calculating such vibration for low-speed loads is presented. Furthermore, a MATLAB/Simulink model is introduced to give a simple and accurate solution that can be used to design beams subjected to any moving loads, i.e., loads of any magnitude and speed. In general, the proposed Simulink model can be used much easier than the alternative FEM software, which is usually used in designing such beams. The obtained results from the analytical formula and the proposed Simulink model were compared with those obtained from Ansys R19.0, and very good agreement has been shown. It was found that the maximum vibration occurs when the load speed is about 0.58 of the critical speed of the beam. Furthermore, the vibration amplitude resulting from a moving load can amplify to 1.65 times the deflection produced by an equivalent static load.
This paper studies the combination of fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. This optimizes the accuracy of the dynamic response and by providing higher level of damping, basically minimizes the wanted stiffness of the structure while at the same time optimizing the achievement.
The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximu
... Show MoreThe aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreThe effect of the aqueous extract of fenugreek seeds (Trigonella Foenum Graecum L.), Rhodium complex (?) with formula [RhL2CLH2O].1 1/2 ETOH and palladium (?) [pdl2].2ETOH,where L=2-hydroxy phenyl piperonalidine was studied on two cancer cell lines. The first cell line was intestine cancer of female albino mice (L20B), the second one was Rhabdomysarcomas (RD)cell line in human. The activity of the new complexes and the aqueous extract was compared to the well-known anticancer drug (cis-platin) by utilizing the in vitro system. The cell lines were treated with four concentrations of cis-platin 31.25,62.5,125 and 250 ?g/ml for 72 hour exposure time. The same concentrations were used with extract and the new complexes. This study showed that t
... Show MoreThe synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More