This study aims to model the flank wear prediction equation in metal cutting, depending on the workpiece material properties and almost cutting conditions. A new method of energy transferred solution between the cutting tool and workpiece was introduced through the flow stress of chip formation by using the Johnson-Cook model. To investigate this model, an orthogonal cutting test coupled with finite element analysis was carried out to solve this model and finding a wear coefficient of cutting 6061-T6 aluminum and the given carbide tool.
In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThis study was designed to evaluate the role of single session autologous facial fat grafting in correcting facial asymmetries after mixing it with platelet-rich fibrin (PRF) and injecting them into rich vascular facial muscular plane.
Fifteen patients (12 females and 3 males) with age ranging from 18 years to 40 years were included in this study and followed up during 6 months, all the patients were treated in the Al-Shaheed Ghazi Al-Hariri for specialized surgeries hospital (Medical City, Baghdad, Iraq).
Auto
This work studies the role of serum apelin-36 and Glutathione S-transferases (GST) activity in association with the hormonal, metabolic profiles and their link to the risk of cardiovascular disease (CVD) in healthy and patients' ladies with polycystic ovary syndrome (PCOS). A total of fifty-four (PCOS) patients and thirty-one healthy woman as a control have been studied. The PCOS patients were subdivided on the basis of body-mass-index (BMI), into 2-subgroups (the first group was obese-PCOS with BMI ≥ 30 and the second group was non-obese PCOS MBI<30). Fasting-insulin-levels and Lipid-profile, Homeostatic-model assessment-of-insulin-resistance (HOMA-IR), follicle-stimulating-hormone (FSH), luteinizing-hormone (LH), testosterone and
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreThe problem of Multicollinearity is one of the most common problems, which deal to a large extent with the internal correlation between explanatory variables. This problem is especially Appear in economics and applied research, The problem of Multicollinearity has a negative effect on the regression model, such as oversized variance degree and estimation of parameters that are unstable when we use the Least Square Method ( OLS), Therefore, other methods were used to estimate the parameters of the negative binomial model, including the estimated Ridge Regression Method and the Liu type estimator, The negative binomial regression model is a nonline
... Show MoreBy- products of corn starch industry were used to prepare media for propagation the lactic acid bacteria as a natural auxotroph. The by- products used were the corn steep water (S) and gluten extract (G) after a proper treatment to get them ready for media preparation. The results showed that it was possible to replace the peptone and meat extract by gluten extract in MRS medium. The growth was approximately similar to that obtained in standard MRS media. Corn steep water (S) was used as well and the growth enhanced by including Tween – 80 at 1% level. The later media named MZ, which was superior for growing standard and local strains and starters. The MZ medium modified by adding acetate and glacial acetic acid similarly to
... Show MoreIn this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of t
... Show More