Preferred Language
Articles
/
joe-2977
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic system (FLS) applied in two stages to calculate the
damage extent and location in simply in and out-of- plane curved beam, the damage deduce by reduction
in stiffness for three levels (20%, 40%, 60%). At the first stage the output faults of the fuzzy system represented by four levels of damage in curved beam (undamaged, slight, moderate, and severe), and at second stage indicate damage location at element with two defuzzification methods (centroid and middle of maximum). The results show that the frequency difference method is efficient to indicate and quantify
damage with accuracy about (99.5%) for slight and moderate damage about (100%) for severe damage. Consequently fuzzy logic performs well for detecting, locating and quantifying damage in curved beam.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Stator Faults Diagnosis and Protection in 3-Phase Induction Motor Based on Wavelet Theory
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Journal Of Babylon University
Spectrophotometric Determination of Sulfamethoxazole in Pure and Pharmaceutical Preparations Based on Condensation Reaction Method
...Show More Authors

A new, Simple, sensitive and accurate spectrophotometric methods have been developed for the determination of sulfamethoxazole (SMZ) drug in pure and dosage forms. This method based on the reaction of sulfamethoxazole (SMZ) with 1,2-napthoquinone-4-sulphonic acid (NQS) to form Nalkylamono naphthoquinone by replacement of the sulphonate group of the naphthoquinone sulphonic acid by an amino group. The colored chromogen shows absorption maximum at 460 nm. The optimum conditions of condensation reaction forms were investigated by (1) univariable method, by optimizing the effect of experimental variables (different bases, reagent concentration, borax concentration and reaction time), (2) central composite design (CCD) including the effect of

... Show More
Preview PDF
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Optimization Algorithms Based on Path Planning and Neural Controller for Mobile Robot
...Show More Authors

In this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Mar 12 2024
Journal Name
Semiconductor Physics, Quantum Electronics And Optoelectronics
Numerical study of single-layer and interlayer grating polarizers based on metasurface structures for quantum key distribution systems
...Show More Authors

Polarization is an important property of light, which refers to the direction of electric field oscillations. Polarization modulation plays an essential role for polarization encoding quantum key distribution (QKD). Polarization is used to encode photons in the QKD systems. In this work, visible-range polarizers with optimal dimensions based on resonance grating waveguides have been numerically designed and investigated using the COMSOL Multiphysics Software. Two structures have been designed, namely a singlelayer metasurface grating (SLMG) polarizer and an interlayer metasurface grating (ILMG) polarizer. Both structures have demonstrated high extinction ratios, ~1.8·103 and 8.68·104 , and the bandwidths equal to 45 and 55 nm for th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
Proposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 07 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Assessment of Employees’ Knowledge Concerning Contributing Factors and Early Detection for Prostate Cancer in Baghdad University Colleges in bab-Almudam
...Show More Authors

View Publication
Scopus (12)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref