Preferred Language
Articles
/
joe-2146
A STUDY OF THE EFFECT OF SEMI-ANGLE OF CONE ON THE VIBRATION CHARACTERISTICS OF CYLINDRICAL-CONICAL COUPLED SHELL STRUCTURE
...Show More Authors

In this work, the effect of variation of semi-angle of the conical part on the vibration characteristics of cylindrical-conical coupled structure is investigated. The shell is made of polyester resin reinforced by continuous E-glass fibers. The case is analyzed experimentally and numerically for orthotropic shell structures. The experimental program is conducted by exciting the fabricated structure by an impact hammer and monitoring the response using an attached accelerometer for different semi-angles of the conical part.
Software named SIGVIEW is used to perform the signal processing on the acquired signal in order to measure the natural frequencies and the corresponding mode shapes. The numerical investigation is achieved using ANSYS (Finite Element software) which was verified by the experimental results. Good agreement is achieved when comparing the experimental and numerical results. The maximum deviation in results was found to be (5.9%). The maximum relative nodal rotational and translational amplitudes associated with the
first normal mode of the orthotropic and isotropic shells are noted for the structure of semi-angle of cone of 45o .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORDS ON SALTICIDAE AND THERIDIIDAE (ARANEAE) SPIDERS FROM ARMENIA
...Show More Authors

New data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Temperature Stress on Physiological and Morphological Traits in Rhizophora apiculata
...Show More Authors

Global warming has had considerable effects on vital ecosystems, which has also been caused by increased temperatures and CO2 that follow changes in different abiotic factors, which poses threats to mangrove forests environment. This research was conducted to examine the physiological and morphological characteristics of the Rhizophora apiculata mangrove regarding higher air temperature for the variety of tree species that respond to climate change. Seedlings were cultivated for three months in regulated growth chambers with three varying temperatures of 38°C, 21°C under CO2 at 450 ppm, and ambient CO2 concentration i.e., 450 ± 20 ppm under average temperature at 28°C as the control condition

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
On Fully Stable Banach Algebra Modules Relative to an Ideal
...Show More Authors

In this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref