In this paper, a new equivalent lumped parameter model is proposed for describing the vibration of beams under the moving load effect. Also, an analytical formula for calculating such vibration for low-speed loads is presented. Furthermore, a MATLAB/Simulink model is introduced to give a simple and accurate solution that can be used to design beams subjected to any moving loads, i.e., loads of any magnitude and speed. In general, the proposed Simulink model can be used much easier than the alternative FEM software, which is usually used in designing such beams. The obtained results from the analytical formula and the proposed Simulink model were compared with those obtained from Ansys R19.0, and very good agreement has been shown. It was found that the maximum vibration occurs when the load speed is about 0.58 of the critical speed of the beam. Furthermore, the vibration amplitude resulting from a moving load can amplify to 1.65 times the deflection produced by an equivalent static load.
The main aim of this research is to introduce financing cost optimization and different financing alternatives. There are many studies about financing cost optimization. All previous studies considering the cost of financing have many shortcomings, some considered only one source of financing as a credit line without taking into account different financing alternatives. Having only one funding alternative powers, restricts contractors and leads to a very specific financing model. Although it is beneficial for the contractor to use a long-term loan to minimize interest charges and prevent a substantial withdrawal from his credit line, none of the existing financial-based planning models have considered long-term loans in
... Show MoreThe use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.
A prepared PMMA/Anthracene film of thickness 70μm was irradiated under reduced pressure ~10-3 to 60Coγ-ray dose of (0.1mrad-10krad) range. The optical properties of the irradiated films were evaluated spectrophotometrically. The absorption spectrum showed induced absorption changes in the 200-400nm range. At 359nm, where there is a decrease in radiation-induced absorption, the optical density as a function of absorbed dose is linear from 10mrad-10Krad.It can therefore, be used as radiation dosimeter for gamma ray in the range 10mrd-10krad
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThe redevelopment of brownfields participate to sustainable urban development, it can make cities more valuable worth for community and more attractive for companies to settle down their projects through investment, and it can help to reduce expenditures for the construction of infrastructures and other services. Recent studies in brownfield redevelopment and investment have shown great interest in urban planning studies because of their negative effects on cities, they promoted sprawl, pollution, social and economic problems. There is a general agreement among researchers and experts that brownfield sites can be reused as green spaces, commerce centers, and residential projects. To promote sustainable urban development the role of the c
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreABSTRACT: BACKGROUND: Trivial number of books, concerning traditional medicine, had mentioned a galactagogual role of Garden cress seeds. Others ignore that. This controversy, in addition to the steroid (family of sex hormones) contents of the seeds, directed us to evaluate the role of this herb in mammogenesis and lactogenesis. METHODS: Twelve parameters were used to assess the effect of Garden cress seeds on the mammary gland of young adult virgin rats. These parameters comprise gross assessment, histological examination (routine/ haematoxylin and eosin stain and special stain/ PAS), enzymatic histochemical study (alkaline phosphatase, acid phosphatase and lipoprotein lipase cytochemical localization), biochemical estimations (hor
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.