In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.
Meloxicam (MLX) is non-steroidal anti -inflammatory, poorly water soluble, highly permeable drug and the rate of its oral absorption is often controlled by the dissolution rate in the gastrointestinal tract. Solid dispersion (SD) is an effective technique for enhancing the solubility and dissolution rate of such drug.
The present study aims to enhance the solubility and the dissolution rate of MLX by SD technique by solvent evaporation method using sodium alginate (SA), hyaluronic acid (HA), collagen and xyloglucan (XG) as gastro-protective hydrophilic natural polymers.
Twelve formulas were prepared in different drug: polymer ratios and evaluated for their, percentage yield, drug content, water so
... Show MoreIn this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, water quality management and decision making. The application of Water Quality Index (WQI) with sixteen physicochemical water quality parameters was performed to evaluate the quality of Tigris River water for drinking usage. This was done by subjecting the water samples collected from eight stations in Baghdad city during the period 2004-2010 to comprehensive physicochemical analysis. The sixteen physicochemical parameters included: Turbidity,
... Show MoreAbstract Background: One of the most important methods to replace lost teeth is dental implants. In order to increase the strength of connection of the implant with the jaw bone to provide early loading after placement, implant is coated by different coating materials that achieved that purpose. The aim of this study was to evaluate the influence of coating CP Ti implant with calcium carbonate on the strength of bone-implant interface after two and six weeks of implantation in rabbit femur bone by torque removal test, histological and histomorphometric analysis. Materials and methods: Coating the surface of commercially pure titanium screws with extra pure synthetic calcium carbonate via electrophoretic deposition method (EPD) was done. The
... Show MoreIn this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, water quality management and decision making. The application of Water Quality Index
(WQI) with sixteen physicochemical water quality parameters was performed to evaluate the quality of Tigris River water for drinking usage. This was done by subjecting the water samples collected from eight stations in Baghdad city during the period 2004-2010 to comprehensive physicochemical analysis. The sixteen physicochemical parameters included: Turbidity, A
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More