In this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3
Four simply supported reinforced concrete (RC) beams were test experimentaly and analyzed using the extended finite element method (XFEM). This method is used to treat the discontinuities resulting from the fracture process and crack propagation in that occur in concrete. The Meso-Scale Approach (MSA) used to model concrete as a heterogenous material consists of a three-phasic material (coarse aggregate, mortar, and air voids in the cement paste). The coarse aggregate that was used in the casting of these beams rounded and crashed aggregate shape with maximum size of 20 mm. The compressive strength used in these beams is equal to 17 MPa and 34 MPa, respectively. These RC beams are designed to fail due to flexure when subjected to lo
... Show MoreNatural frequency under initial stresses for simply supported cross-ply composite laminated plates (E glass- fiber) are obtained using Refind theory (RPT). This theory accounts for parabolic distribution of the transverse shear strain through the plate thickness and satisfies the zero traction boundary conditions on the surfaces of the plate without using shear correction factors. The governing equations for Eigen value problem under initial stress are derived using Hamilton’s principle and solved using Navier solution for simply supported cross-ply symmetric and antisymmetric laminated plates. The effect of many design factors such as modulus ratio, thickness ratio and number of laminates on the Natural frequency and buckling stresses
... Show MoreThis study focuses on CFD analysis in the field of the shell and double concentric tube heat exchanger. A commercial CFD package was used to resolve the flow and temperature fields inside the shell and tubes of the heat exchanger used. Simulations by CFD are performed for the single shell and double concentric tube.
This heat exchanger included 16 tubes and 20 baffles. The shell had a length of 1.18 m and its diameter was 220 mm. Solid Works 2014, ANSYS 15.0 software was used to analyze the fields of flow and temperature inside the shell and the tubes. The RNG k-ε model was used and it provided good results. Coarse and fine meshes were investigated, showing that aspect ratio has no significant effect. 14 million
... Show MoreThe study was conducted at the fields of the Department of Horticulture and Landscape Gardening, College of Agriculture Engineering Sciences, University of Baghdad. During the spring 2017. All the recommended practices were followed during experimentation. The experimental material consisted four Genotype it is Batraa, Btera, Mosulle, and local selection. The experiment was applied in Randomized Complete Block Design (RCBD). The objectives of Study were to estimate the some genetic parameters and path coefficient for some traits Okra, The results of statistical analysis for these genotypes were highly significant differences for all traits except the traits number of leaves, the numbe
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More