The experiment was conducted in field of the University of Baghdad, Jadryia region, Baghdad to measure vibration and performance efficiency of grass mower (machine cutting grass). Vibration in three axes are longitudinal X , lateral Y and vertical Z in four places of mower machine during cutting grass and Practical Productivity, Efficiency and Fuel Consumption measured in this experiment . Factorial design (3 x 2) used, mower speeds included 1.9 3.6 and 6.4 km/hr and engine load included idling and full load according to randomized complete design were used in this experiment. Least Significant Design (LSD) 0.05 was used to compare the mean of treatment. Result were showed that the mower speed 6.4 km/hr recorded high productivity (0.6557 ha/hr), low fuel consumption (1.62 l/ha), least efficiency ( 83.97 %), vibration values for three axes X,Y and Z (8.28, 7.85) and (5.35 m/sec²) for mower seat, (6.25, 7.05) and (4.80 m/sec²) for steering wheel and (14.78, 13.8) and (11.58 m/sec²) for mower chasses and (21.45, 20.05) and (16.15 m/sec²) for cover blades. Engine full load recorded high productivity (0.4080 ha/hr), efficiency (84.47%), and high vibration values for three axes X, Y and Z were (5.46, 5,03) and (3.56 m/sec²) for mower seat , (4.56, 5.30) and (3.36 m/sec²) for steering wheel, (13.30, 12.32) and (10.93 m/sec²) for mower chasses and (18.13, 17.03) and (13.83 m/sec²) for cover blades,Then these result a cross legislated permissible vibration exposure limits in the world.
The research aimed at identifying the level of Acute stress disorder and orientation towards supplication among the wives of the martyrs and knowledge of the two levels according to the age groups, academic achievement and profession. Sample of (72) wife of a martyr, and the results of the research indicated that the wives of the martyrs have symptoms of distress disorder and have adherence to the supplication to alleviate that disorder, as well as the results indicated that there are statistical differences in distress disturbance according to the variable of age groups, the profession variable and the variable of enrollment The academic year. As for the measure of the trend towards supplication, there are no statistical dif
... Show MoreIn the present work, steady, laminar natural convection in nonrectangular enclosures is analyzed numerically with and without fin. Vertical walls insulated while horizontal walls maintained isothermal at different temperature and the fin was placed on horizontal surface. The length of fin was equal (B/L=0.22, 0.44 and 0.66) and thickness of fin was constant. Various parameters are studied: Rayleigh number (from 104 to 107 ), Prandtl number (0.7), number of fin change from (1-3) and aspect ratio (H/L= 0.15 to 0.5). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on program in Fortran 90 with Tec plot program. The finite difference method is used. Streamlines and isotherms are prese
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023