This paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has been adopted to generate these pseudo-random variables dependent on its statistical characteristics such as coefficient of variance and probability density function that gathered from a review of literatures.
This aims tackles the importance of the organizational energy of the hotel organizations that search the success in the business field to penetrate in the whole tourist markets, and to draw the policies and firm rules which must be framed with the administrative strategies that contributed in creativity and achievement the targets besides provide a future vision due to its position among the competitive henceforth achieving the activity. This is what the chapters tackle in the theoretical side. Also many general questions have been arisen to determinate the importance of the research and many other special questions that express the problem of the study. To limit the levels of study alter
... Show MoreAbstract\
In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the
... Show MoreAbstract: This study aims to investigate the backscattering electron coefficient for SixGe1-x/Si heterostructure sample as a function of primary electron beam energy (0.25-20 keV) and Ge concentration in the alloy. The results obtained have several characteristics that are as follows: the first one is that the intensity of the backscattered signal above the alloy is mainly related to the average atomic number of the SixGe1-x alloy. The second feature is that the backscattering electron coefficient line scan shows a constant value above each layer at low primary electron energies below 5 keV. However, at 5 keV and above, a peak and a dip appeared on the line scan above Si-Ge alloy and Si, respectively, close to the interfacing line
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreSemantic segmentation is effective in numerous object classification tasks such as autonomous vehicles and scene understanding. With the advent in the deep learning domain, lots of efforts are seen in applying deep learning algorithms for semantic segmentation. Most of the algorithms gain the required accuracy while compromising on their storage and computational requirements. The work showcases the implementation of Convolutional Neural Network (CNN) using Discrete Cosine Transform (DCT), where DCT exhibit exceptional energy compaction properties. The proposed Adaptive Weight Wiener Filter (AWWF) rearranges the DCT coefficients by truncating the high frequency coefficients. AWWF-DCT model reinstate the convolutional l
... Show More