In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic system (FLS) applied in two stages to calculate the
damage extent and location in simply in and out-of- plane curved beam, the damage deduce by reduction
in stiffness for three levels (20%, 40%, 60%). At the first stage the output faults of the fuzzy system represented by four levels of damage in curved beam (undamaged, slight, moderate, and severe), and at second stage indicate damage location at element with two defuzzification methods (centroid and middle of maximum). The results show that the frequency difference method is efficient to indicate and quantify
damage with accuracy about (99.5%) for slight and moderate damage about (100%) for severe damage. Consequently fuzzy logic performs well for detecting, locating and quantifying damage in curved beam.
Abstract:
The Iraqi economy faces complex economic challenges that threaten the prospects for growth and stability in the short and medium term, The decrease in oil revenues on which Iraq is based in financing its total expenditure, both operational and investment, led to the emergence of a deficit in the government budget, As the global oil price crisis affected the revenues of the Iraqi government negatively, especially as this negative impact coincided with the increase in military spending resulting from Iraq's war against terrorism, Which led to the Iraqi government to implement austerity measures were to reduce public spending on several projects, which are less important compared to projects that a
... Show MoreThe research aims to demonstrate the impact of TDABC as a strategic technology compatible with the rapid developments and changes in the contemporary business environment) on pricing decisions. As TDABC provides a new philosophy in the process of allocating indirect costs through time directives of resources and activities to the goal of cost, identifying unused energy and associated costs, which provides the management of economic units with financial and non-financial information that helps them in the complex and dangerous decision-making process. Of pricing decisions. To achieve better pricing decisions in light of the endeavor to maintain customers in a highly competitive environment and a variety of alternatives, the resear
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreThe density functional B3LYP is used to investigate the effect of decorating the silver (Ag) atom on the sensing capability of an AlN nanotube (AlN-NT) in detecting thiophosgene (TP). There is a weak interaction between the pristine AlN-NT and TP with the sensing response (SR) of approximately 9.4. Decoration of the Ag atom into the structure of AlN-NT causes the adsorption energy of TP to decrease from − 6.2 to − 22.5 kcal/mol. Also, the corresponding SR increases significantly to 100.5. Moreover, the recovery time when TP is desorbed from the surface of the Ag-decorated AlN-NT (Ag@AlN-NT) is short, i.e., 24.9 s. The results show that Ag@AlN-NT can selectively detect TP among other gases, such as N2, O2, CO2, CO, and H2O.
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreThe research consists of five chapters, and in the first chapter, it addresses the introduction and importance of the research, where the researcher explained the importance of bio-motor abilities and their role in achieving a high level through their connection to the skill performance of standing on the hands followed by the forward roll, and the research problem: Do these bio-motor abilities have an impact on the level of skill performance? Handstand followed by forward roll.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreUltraviolet spectrophotometric studies for antibiotic (amino glycoside) derivatives including, Neomycin, Streptomycin, Gentamycin and Kanamycin with special reagents, which are benzoyl chloride; benzene sulfonyl chloride, toluenesulfonyl chloride and phthalic anhydride were made. Amino glycosides derivatives were followed through measurements of the ultraviolet absorbance (A) from which the absorptivity (ε) of the complexes was deduced and molar absorbances using Ultraviolet for products and calculate the number of reagents molecule that combine to amino glycosides.