Time-domain spectral matching commonly used to define seismic inputs to dynamic analysis in terms of acceleration time history compatible with a specific target response spectrum is used in this study to investigate the second-order geometric effect of P-delta on the seismic response of base-isolated high-rise buildings. A synthetic time series is generated by adjusting reference time series that consist of available readings from a past earthquake of the 1940 El Centro earthquake adopted as an initial time series. The superstructure of a 20-story base isolated building is represented by a 3-D finite element model using ETABS software. The results of the base isolated building show that base isolation technique significantly reduces inter-story drift and acceleration of the superstructure. Results presented reflect the potential of synthetic time history analysis to capture base isolator characteristics and to show their effect on the results of the dynamic analysis when compared to target response spectrum analysis. Geometric nonlinear analysis due to P-delta reveals that p-delta effect reduces base shear and story acceleration by about 5%, whereas inter-story drifts increased by about 3%. This study shows that including geometric nonlinearity due to p-delta reduces pseudo acceleration of the superstructure and hence the earthquake-induced forces in the structure.
This research is carried out to investigate the behavior of self-compacting concrete (SCC) two-way slabs with central square opening under uniformly distributed loads. The experimental part of this research is based on casting and testing six SCC simply supported square slabs having the same dimentions and reinforcement. One of these slabs was cast without opening as a control slab. While, the other five slabs having opening ratios (OR) of 2.78%, 6.25%, 11.11%, 17.36% and 25.00%. From the experimental results it is found that the maximum percentage decrease in cracking and ultimate uniform loads were 31.82% and 12.17% compared to control slab for opening ratios (OR
... Show More
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
A total of 589 fishes, belonging to 23 species were collected from eight different localities
in north and mid Iraq during 1993. The parasitological inspection of such fishes revealed the
presence of 59 parasite species and two fungi. Among such parasites, five monogenetic
trematodes were recorded on the gills of some fishes for the first time in Iraq. These
included:- Ancyrocephalus vanbenedenii on Liza abu from Tigris river at Al-Zaafaraniya,
south of Baghdad; Dactylogyrus anchoratus on Cyprinus carpio from Tigris river at Al –
Zaafaranya D. minutus on C. carpio from both Tigris river at Al-Zaafaraniya and Euphrates
river at Al-Qadisiya dam lake; Discocotyle sagittata on L. abu from both the drainage system
at
Internet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT
... Show More