In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.
Fourteen morphologically varied Ricinus communis L. seeds were collected from different localities in Egypt, El-Sudan and Saudi Arabia. Seed morphology and ITS barcoding analysis were performed to assess their diversity and phylogenetic relationship. Sequence’s alignment of nrITS region from different accessions display high levels of genetic similarities. Cluster analysis could not group different accessions according to their geographical distribution. Nevertheless, the genetic barcodes are interestingly matched with the morphological features of the Ricinus seeds. In conclusion, seed morphology proved to be a valuable tool in evaluating biodiversity and phylogenetic relationship in plant species with different loca
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreGastrointestinal diseases and especially chronic gastritis are mainly induced by Helicobacter pylori infection, and provides the basis for gastric carcinogenesis and colorectal cancer. The study involved the detection of serum anti-H. pylori IgG and IgA antibody of and some serum biomarkers ;CEA and CA19-9 in patients with gastrointestinal diseases. Fifty eight serum samples were collected from 25 males and 33 females .Peripheral venous blood was collected from each patient and sera obtained by centrifugation. Serum anti-H. pylori IgG and IgA ,serum CEA and CA19-9 were evaluated by enzyme-linked immunoadsorbent assays (ELISA).Forty eight serum samples were positive for IgG (82.7% ) divided int
... Show MoreCountries are developing the spatial development of their societies through the projects that they undertake in various ways, and this development may be cause great impact on the environment, which also depend on the type of development, whether industrial, agricultural, or service and after the problems that occurred as a result of development on the environment, most of the countries currently did to legislating laws Environmental and some other procedures before granting environmental approvals for the purpose of establishing spatial development projects. One of the most important of these laws and regulations is Environmental impact assessment (EIA). The environmental impact asse
Background: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV). For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was follo
... Show MoreJPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.