Preferred Language
Articles
/
joe-2049
Damage Detection and Assessment of Stiffness and Mass Matrices in Curved Simply Supported Beam Using Genetic Algorithm
...Show More Authors

In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an Autonomous Mobile Robot using Enhanced Bacterial Foraging Optimization Algorithm
...Show More Authors

This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Sun Jul 13 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Quantitative detection and correlation of Epstein - Barr Virus in plasma with gingivitis and severity of chronic periodontitis by using real-time polymerase chain reaction technique
...Show More Authors

Background: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Nov 30 2019
Journal Name
Journal Of Engineering And Applied Sciences
Using Particle Swarm Optimization Algorithm to Address the Multicollinearity Problem
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Feb 22 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF ENTEROTOXINS OF Staphylococcus aureus IN MILK AND LOCOLLY SOFT CHEESES IN BAGHDAD CITY: DETECTION OF ENTEROTOXINS OF Staphylococcus aureus IN MILK AND LOCOLLY SOFT CHEESES IN BAGHDAD CITY
...Show More Authors

This study aimed to detect of contamination of milk and local soft cheese with Staphylococcus aureus and their enterotoxins with attempt to detect the enterotoxin genes in some isolates of this bacteria. A total of 120 samples, 76 of raw milk and 44 of soft cheese were collected from different markets of Baghdad city. Enterotoxins in these samples were detected by VIDAS Set 2 system and it was found that enterotoxin A is present in a rate of 44.74% in milk samples and in a rate 54.50% in cheese samples. While other enterotoxins B, C, D, E were not found in any rate in any samples.
Through the study 60 isolates obtained from milk and cheeses were identified as Staphylococcus aureus by cultural, morphological and biochemical test by u

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Mass Transfer Study of Oleic Acid Esterification over Prepared Nanoporous HY zeolite
...Show More Authors

A mathematical model was proposed to study the microkinetics of esterification reaction of oleic acid with ethanol over prepared HY zeolite catalyst. The catalyst was prepared from Iraqi kaolin source and its properties were characterized by different techniques. The esterification was done under different temperature (40 to 70˚C) with 6:1 for molar ratio of ethanol to oleic acid and 5 % catalyst loading.

   The microkinetics study was done over two period of time each period was examined individually to calculate the reaction rate constant and activation energy. The impact of the mass transfer resistance to the reactant was also investigated; two different studies have been accomplished to do this purpose.

&nb

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Mass Transfer Study of Oleic Acid Esterification over Prepared Nanoporous HY zeolite
...Show More Authors

A mathematical model was proposed to study the microkinetics of esterification reaction of oleic acid with ethanol over prepared HY zeolite catalyst. The catalyst was prepared from Iraqi kaolin source and its properties were characterized by different techniques. The esterification was done under different temperature (40 to 70˚C) with 6:1 for molar ratio of ethanol to oleic acid and 5 % catalyst loading.    The microkinetics study was done over two period of time each period was examined individually to calculate the reaction rate constant and activation energy. The impact of the mass transfer resistance to the reactant was also investigated; two different studies have been accomplished to do this purpose.    The e

... Show More
View Publication
Crossref (9)
Crossref