In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.
Objectives: To determine the (QoL) for patients with permanent pacemaker and to find-out the relationship between
these patients’ (QoL) and their sociodemographic characteristics such as age, gender, level of education, and
occupation.
Methodology: ٨ purposive non-probability” sample of (62) patient with permanent pacemaker was involved in this
study. The developed questionnaire consists of (4) parts which include !.demographic data form, 2.disease-related
information form, 3.socioeconomic data form, and 4.Permanent pacemaker patient’s quality of life questionnaire data
form. The validity and reliability of the questionnaire were determined through the application of a pilot study. ٨
descriptive statistical a
The present study aimed to asspssment the nutrition a program to sample of student from internal departments of Baghdad University (AL-Jadiriya Complex) and the University of AL-MustanSiriya four grades and aged (19-24) year study included 150 male and female students by (75) male and (75) of female register height, weight nd body mass index were study habits and food pattern of the same sample (150) and by aspecial form and take the personal information interviews and record information on food intake during 24 hour .noted adifference practie in the weights and longths of male and female (sample).
BMI rates were within the normal weight as the value of BMI for males aged (19- 21)and (22-24) and (22.21) and (23,37),respectively and th
This study aims at identifying the reality of alternative assessment for teachers of the first cycle of the basic education in the Sultanate of Oman with respect to the degree of teachers' use of alternative assessment strategies, level of self-efficacy for alternative assessment strategies, and attitude towards alternative assessment, and their relationship with other variables. To achieve the aims of the study, a descriptive research approach was utilized. A 5-point self-rated questionnaire was developed. It consists of three sections: Actual use of alternative assessment strategies (21 items), self-efficacy for alternative assessment strategies (21 items), and attitude towards alternative assessment (27 items). The psychometric proper
... Show MoreBackground: Oil refinery workers are continuously exposed to numerous hazardous materials. Petroleum contains the heavy metals as a natural constituent or as additives. These metals induce the production of ROS which associated with an oxidative damage to DNA, proteins, and lipids. This study was conducted to assess the salivary levels of heavy metals, salivary oxidative status, oral immunological activity (salivary sIgA) and assessment of the oral findings among the workers of Al-Daura oil refinery in Baghdad city. Subjects, Materials and Methods: This study was done in Al-Daura oil refinery; samples consist of 60 workers involved in refinery processes (study group) and 20 non-workers (control group). Oral examination and saliva collection
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show More