Preferred Language
Articles
/
joe-2049
Damage Detection and Assessment of Stiffness and Mass Matrices in Curved Simply Supported Beam Using Genetic Algorithm
...Show More Authors

In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 10 2017
Journal Name
Journal Of The College Of Basic Education
Detection of some major elements and protein in Fusarium wilt disease infected tomato(Lycopersicon esculentum) treated with Arbuscular mycorrhizal fung
...Show More Authors

The present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhizal colonization in al

... Show More
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Assessment of Azotobacter chroococcum’s Ability to Produce Hydrolytic Enzymes and Enhance Growth of Vicia faba
...Show More Authors

A. chroococcum isolate was examined for its ability to produce the hydrolytic enzymes chitinase, pectinase, protease, and lipase, in an effort to enhance the growth of fava bean (Vicia faba). Biological experiment was conducted in pots with complete random design (CRD). The experiment includes three treatments: control (plant without treatment) (P), NPK fertilizer (plant + fertilizer) (PF), and A. chroococcum inoculum (plant + A. chroococcum) (PA). These treatments were performed with sterile and non-sterile soil, which were planted with fava beans. At the end of experiment (seven weeks from planting), length and weight of plant shoot and plant root were calculated. The results show that the isolate wa

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Coping Strategies for Parents of Autistic Child and their relation to educational level
...Show More Authors

Objectives: To assess the coping strategies of parents of children with autism and the relationship of
different strategies with their educational level.
Methodology: A descriptive analytical study was carried out from Feb. 14th, 2013 through April, 10th
, 2013 in
several private rehabilitation centers of autism in Baghdad city. A non- probability (purposive) sample of 100
autistic children and 100 of their parents (father or mother) was assessed by a questionnaire which consisted of
two parts; the first part is concerned with the demographic characteristics of the child and demographic
characteristics of the parents; the second part consisted of 50 questions about coping strategies that were
distributed on 8 doma

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Development prediction algorithm of vehicle travel time based traffic data
...Show More Authors

This work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of salivary immunoglobulin A, interleu-kin-6 and C-reactive protein in chronic kidney dis-ease patients on hemodialysis and on conservative treatment
...Show More Authors

Background: Chronic kidney disease is a gradual loss of kidney function with diabetes and hypertension as the leading cause. Chronic kidney disease is one of these systemic diseases that can affect salivary contents. Aims: This study aimed to assess salivary immunoglobulin A, interleukin-6 and C- reactive protein in chronic kidney disease patients on hemodialysis and those on conservative treatment in comparison with control subjects. Materials and methods: Ninety subjects were included in this study divided into three groups: 30 patients with chronic kidney disease on hemodialysis for at least 6 months ago; 30 patients with chronic kidney disease on conservative treatment and 30 healthy control subjects. Secretory immunoglobulin A, inte

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Land use change in Baghdad City and assessment of the Jadriyah and Umm Al- Khanazeer Island Important Bird Area (IBA) from 1984 to 2020
...Show More Authors

Land use change, particularly the expansion of urban areas and associated human activities at the expense of natural and semi-natural areas, is a major ecological issue in urban areas around the world. Climate change being a very strong additional driver for changing the temperature and habitat in the cities. This also applies to Baghdad, Iraq, where urbanisation and climate change exerts a major pressure on the natural habitats of the city, and thus may affect the ability of city planners to adapt to future climate change scenarios. Here we present evidence of substantial growth in urban areas, increases in temperature, and degradation of natural vegetation within Baghdad city by using Remote Sensing techniques and an assessment for the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref