Preferred Language
Articles
/
joe-2049
Damage Detection and Assessment of Stiffness and Mass Matrices in Curved Simply Supported Beam Using Genetic Algorithm
...Show More Authors

In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency is the best objective and no error was recorded in prediction of location and small error in detecting damage value. Also the result show that the genetic algorithm method are efficient indicating and quantifying single and multiple damage with high precision, and the prediction error for the CGA are less than corresponding value for the BGA.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 06 2023
Journal Name
Journal Of The Pakistan Medical Association
The role of Tumour Necrosis Factor Alpha (TNF-ALPHA) serum level and genetic polymorphisms with cutaneous leishmania infections
...Show More Authors

Objective: To assess the role of tumour necrosis factor alpha level and genotyping in susceptibility to leishmaniasis.Method: The case-control study was conducted from March to July 2021 at Baqubah Teaching Hospital, Diyala, Iraq,and comprised patients of cutaneous leishmaniasis in group A and healthy controls in group B. The serum level andsingle nucleotide polymorphisms of tumour necrosis factor-alpha rs41297589 and rs1800629 were compared betweenthe groups. Data was analysed using SPSS 28.Results: Of the 150 subjects, there were 75(50%) in group A; 39(52%) males and 36(48%) females with mean age23.91±13.14 years. The remaining 75(50%) subjects were in group B; 38(50.7%) males and 37(49.3%) females withmean age 22.84±4.35 years.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Meta Gene
Interleukin-2 serum level, genetic polymorphism (rs2069763), anti-rubella antibody and risk of multiple sclerosis among Iraqi patients
...Show More Authors

Background: Multiple sclerosis (MS) is a chronic neurodegenerative autoimmune disease mediated by autoreactive T cells against myelin-basic proteins. Cytokines are suggested to play a role in the etiopathogenesis of the disease. Among these cytokines is interleukin-2 (IL-2). Aim of the study: To investigate the association between IL2+166 G/T single nucleotide polymorphism (SNP: rs2069763) and MS in Iraqi patients. Serum level of IL-2 was also detected. Anti-rubella IgG antibody was further determined in the sera of patients. Patients and methods: Eighty MS patients (28 males and 52 females; age mean ± SD: 39.2 ± 16.1 years) and 80 healthy control matched patients for age (32.15 ± 16.13 years) and gender (28 males and 52 females) were en

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2017
Journal Name
2017 5th International Conference On Information And Communication Technology (icoic7)
Analysis of the number of ants in ant colony system algorithm
...Show More Authors

View Publication
Scopus (29)
Crossref (14)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detection of Nutrients and Major Ions at Al Muthanna Storage Site Soil
...Show More Authors

In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical And Cellular Archives
Phenotypic and molecular detection of Escherichia coli efflux pumps from UTI patients
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study of the electrical properties of Ion Beam Sputtered thin AlNiCo films
...Show More Authors

The electrical properties of the AlNiCo thin films with thickness (1000oA) deposited on glass substrates using Ion – Beam sputtering (IBS) technique under vacuum <10-6 torr have been studied . Also it studied the effect of annealing temperature from this films , It is found that the effective energy decrease with increase of temperature and the conductivity decrease with increase temperature 323oK but after this degree the conductivity increasing .

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Semi-parametric regression function estimation for environmental pollution with measurement error using artificial flower pollination algorithm
...Show More Authors

Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin

... Show More
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Investigating the Effect of Genetic Polymorphisms of Deiodinase Type 2 on Levothyroxine Dose Requirements in Patients with Hypothyroidism
...Show More Authors

Background: Hypothyroidism is the most abundant thyroid disorder worldwide. For decades, levothyroxine was the main effective pharmacological treatment for hypothyroidism. A variety of factors can influence levothyroxine dose, such as genetic variations. Studying the impact of genetic polymorphisms on the administration of medications was risen remarkably. Different genetic variations were investigated that might affect levothyroxine dose requirements, especially the deiodinase enzymes.  Deiodinase type 2 genetic polymorphisms’ impact on levothyroxine dose was studied in different populations.

Objective: To examine the association of the two single nucleotide polymorphism (SNP)s of deiodinase t

... Show More
View Publication Preview PDF
Scopus Crossref