In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.
This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreABSTRACTBackground : Acne vulgaris is a
common skin disease, affecting more than 85% of
adolescents and often continuing into adulthood.
People between 11 and 30 years of age and up to
5% of older adults. For most patients acne remains
a nuisance with occasional flares of unsightly
comedones, pustules and nodules. For other less
fortunate persons, the sever inflammatory response
to Propionibacterium acnes (P.acnes) results in
permanent
Methods: Disfiguring scars. (1, 2) Stigmata of sever
acne cane lead to social ostracism, withdrawal
from society and severe psychologic
depression (1-4).
Result Pathogenesis of acne Traditionally, acne
has been thought of as a multifactorial disease of
the fo
The lethality of inorganic arsenic (As) and the threat it poses have made the development of efficient As detection systems a vital necessity. This research work demonstrates a sensing layer made of hydrous ferric oxide (Fe2H2O4) to detect As(III) and As(V) ions in a surface plasmon resonance system. The sensor conceptualizes on the strength of Fe2H2O4 to absorb As ions and the interaction of plasmon resonance towards the changes occurring on the sensing layer. Detection sensitivity values for As(III) and As(V) were 1.083 °·ppb−1 and 0.922 °·ppb
Optimizing the Access Point (AP) deployment is of great importance in wireless applications owing the requirement to provide efficient and cost-effective communication. Highly targeted by many researchers and academic industries, Quality of Service (QOS) is an important primary parameter and objective in mind along with AP placement and overall publishing cost. This study proposes and investigates a multi-level optimization algorithm based on Binary Particle Swarm Optimization (BPSO). It aims to an optimal multi-floor AP placement with effective coverage that makes it more capable of supporting QOS and cost effectiveness. Five pairs (coverage, AP placement) of weights, signal threshol
يعتبر "تاج الأشواك" أو نبات شوكة المسيح، وهو من نباتات الزينة الطبية ، ينتمي إلى جنس يوفوربيا. E. milii يحتوي كميات وفيرة من المركبات الفينولية ، التربينات، الستيرويدات والقلويدات. كانت الأهداف الرئيسية لهذه الدراسة هي فحص مستخلصات الفلافونويد والنانو فلافونويد ضد نوعين من خطوط الخلايا السرطانية. تم تصنيع مركبات الفلافونويد النانوية عن طريق تفاعل مركب الكيتوسان والماليك اسد. تم تحليل مركبات الفلافونويد ال
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreJPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.