One of the main parts in hydraulic system is directional control valve, which is needed in order to operate hydraulic actuator. Practically, a conventional directional control valve has complex construction and moving parts, such as spool. Alternatively, a proposed Magneto-rheological (MR) directional control valve can offer a better solution without any moving parts by means of MR fluid. MR fluid consists of stable suspension of micro-sized magnetic particles dispersed in carrier medium like hydrocarbon oil. The main objectives of this present research are to design a MR directional control valve using MR fluid, to analyse its magnetic circuit using FEMM software, and to study and simulate the performance of this valve. In this research, a comprehensive literature review on the advancement of this technology provides valuable insight on MR valve design by previous researchers. The design of MR directional control valve, the construction of the valve and the principle of work are presented. The design of proposed MR single valve has enabled the development of the MR directional control valve. Design and finite elements analysis using FEMM software of the MR single valve and MR directional control valve were done to obtain the optimal design. The valve was fabricated and the experimental rig for valve test was developed. The experiment presentation for functional working principle of the valve and valve performance were shown. The results of the simulation results show that the valve works in controlling the direction and the speed of hydraulic actuators. The valve can be operated with variable flow rate by varying the electric current. It is found that the electric current is inversely proportional to the flow rate. High current produces low flow rate and vice versa. It does the work of the valves to proportionally control the hydraulic actuators. The valve can be operated as ON-OFF directional control valve as well as proportional directional control valve with meter-in or meter-out by changing electric connection.
Aniera desert/cola was found new to science and to the Iraqi fauna. The description was
mainly based on external features and male genit
Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show More
Mixed convection heat transfer to air inside an enclosure is investigated experimentally. The bottom wall of the enclosure is maintained at higher temperature than that of the top wall which keeps in oscillation motion, whereas the left and right walls are well insulated. The differential temperature of the bottom and top walls changed several times in order to accurately characterize the temperature distribution over a considerable range of Richardson number. Adjustable aspect ratio box was built as a test rig to determine the effects of Richardson number and aspect ratio on the flow behavior of the air inside the enclosure. The flow fields and the average Nusselt number profiles were presented in this wo
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreAbstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreMultiple sclerosis (MS) is a chronic, inflammatory demyelinating disease of central nervous system with complex etiopathogenesis that impacts young adults (Lee et al., 2015), and MS impacts younger and middle aged character and leads to a range of disabilities that can alter their daily routines (Yara et al, 2010). Although, the exact cause of MS is still undetermined, the disease is mediated by adaptive immunity through the infiltration of T cells into the central nervous system (Bjelobaba et al, 2017). MS causes the Focal neurological symptomsand biochemical changes in the molecular level and the variation of neural cells such as loss or alteration of sensation, motor function, visible signs such as blurred vision or transient blindness,
... Show MoreThe research aimed to identify and build two specialized scales for cognitive load and mental stress and to identify the level of each of them among 110-meter steeplechase runners among youth, and to prepare a psychological counseling approach to reduce the level of cognitive load and mental stress among 110-meter steeplechase runners among youth, so that the two research hypotheses are that there are differences. There are statistically significant differences between the results of the pre- and post-tests of the experimental group in measuring cognitive load. There are statistically significant differences between the results of the pre- and post-tests of the experimental group in measuring mental stress. The experimental method w
... Show MoreThis research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome
... Show MoreLiquid-crystalline organic semiconductors exhibit unique properties that make them highly interesting for organic optoelectronic applications. Their optical and electrical anisotropies and the possibility to control the alignment of the liquid-crystalline semiconductor allow not only to optimize charge carrier transport, but to tune the optical property of organic thin-film devices as well. In this study, the molecular orientation in a liquid-crystalline semiconductor film is tuned by a novel blading process as well as by different annealing protocols. The altered alignment is verified by cross-polarized optical microscopy and spectroscopic ellipsometry. It is shown that a change in alignment of the
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More