Preferred Language
Articles
/
joe-2977
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic system (FLS) applied in two stages to calculate the
damage extent and location in simply in and out-of- plane curved beam, the damage deduce by reduction
in stiffness for three levels (20%, 40%, 60%). At the first stage the output faults of the fuzzy system represented by four levels of damage in curved beam (undamaged, slight, moderate, and severe), and at second stage indicate damage location at element with two defuzzification methods (centroid and middle of maximum). The results show that the frequency difference method is efficient to indicate and quantify
damage with accuracy about (99.5%) for slight and moderate damage about (100%) for severe damage. Consequently fuzzy logic performs well for detecting, locating and quantifying damage in curved beam.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 31 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
A comparative study to evaluate the effect of ultrasonic agitation on push-out bond strength of three root-end filling materials: An in vitro study
...Show More Authors

Aim: To evaluate the effect of ultrasonic agitation for retrograde biodceramic root repair, MTA and biodentine filling materials on push-out bond strength to dentine walls. Materials and Methods: Ninety extracted human teeth with single straight roots were selected randomly. After disinfection and cleaning, the coronal portions were sectioned to standardize the root canal length at 15mm. following root canal shaping, obturation and apical roots resection, retrograde cavities were prepared. Teeth were categorized depending on the filling material used into three groups, 30 teeth each. Group A filled with bioceramic root repair material, B with MTA and C with Biodentine material. These groups were divided in to three subgroup (n= 10). Subgrou

... Show More
Scopus (1)
Scopus
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Interpretation of Mud Losses in Carbonates Based on Cuttings Description, Well-Logging, Seismic and Coherency Data
...Show More Authors

    Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.

   The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 28 2021
Journal Name
Misan Journal For Physical Education Sciences
The Effectiveness of Using Generative Learning Model in Learning Kinetic Series on Rings and Horizontal Bar In Artistic Gymnastics for men
...Show More Authors

The aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di

... Show More
Preview PDF
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Interval valued fuzzy ideals of TM-algebra
...Show More Authors

We introduce the notion of interval value fuzzy ideal of TM-algebra as a generalization of a fuzzy ideal of TM-algebra and investigate some basic properties. Interval value fuzzy ideals and T-ideals are defined and several examples are presented. The relation between interval value fuzzy ideal and fuzzy T-ideal is studied. Abstract We introduce the notion of interval value fuzzy ideal of TM-algebra as a generalization of a fuzzy ideal of TM-algebra and investigate some basic properties. Interval value fuzzy ideals and T- ideals are defined and several examples are presented. The relation between interval value fuzzy ideal and fuzzy T-ideal is studied.

Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 04 2022
Journal Name
Pakistan Journal Of Medical And Health Science
Detection of aadA1 and aac(3)-1V resistance genes in Acinetobacter baumannii
...Show More Authors

Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
DETECTION OF BACTERIAL INFECTIONS AND THEIR RESISTANCE IN BURN WOUND OF SKIN
...Show More Authors

Scopus
Publication Date
Wed Feb 03 2016
Journal Name
Nanoscience And Nanotechnology
Fabrication of Functionalize Reduce Graphene Oxide and Its Application in Ampicillin Detection
...Show More Authors

Graphene oxide (GO) was prepared from graphite (GT) with Hammer method, the GO was reduced with hydrazine hydrate to produce a reduced graphene oxide (RGO). The RGO was reacted with thiocarbohydrazide (TCH) to functionalize the RGO with 4-amino-3-symbol-1h-1, 2, 4-triazol-5 (4H) –thion group and to obtain (RGOT). All the prepared nanomaterial and the product of the functionalization RGOT were characterized with Fourier transformer infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) analysis. RGOT mixed with ultrasonic device at different pH values of phosphate buffer solution (PBS), the mixture used to modifying a screen printed carbon electrodes SPCE and with cyclic voltammetry the sensitivity of selectivity of the new modifying elect

... Show More
Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Molecular Detection and Antiserum Preparation of Begomoviruses Infecting Zucchini Squash in Iraq
...Show More Authors
Abstract<p>Begomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV) <italic>Begomovirus solanumpalampurense</italic>, Squash leaf curl virus (SLCuV) <italic>B. cucurbitapeponis</italic> and Tomato yellow leaf curl virus (TYLCV) <italic>B. </italic></p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection and isolation of flavonoids from Calendula officinalis (F.Asteraceae) cultivated in Iraq
...Show More Authors

Calendula officinalis L. (Asteraceae) known as marigold is known to have several pharmacological activities and used for the treatment of several diseases as measles, jaundice, constipation and several inflammations. Marigold flowers contain several chemical constituents mainly flavonoids, triterpenoids and essential oil. In this study marigold flowers cultivated in Iraq had been investigated for its flavonoids content. The study revealed the presence of quercetin and kaempferol glycosides and the absence of myricetin glycosides. The flowers were extracted with ethanol 70% fractionated with different solvent and the flavonoids were isolated by preparative HPLC. The isolated flavonoids were identified by measuring melting points, UV, IR,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref