MB Mahmood, BN Dhannoon
The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.
This study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show MoreStick-slip is kind of vibration which associated with drilling operation in around the bottom hole assembly (BHA) due to the small clearance between drill string & the open hole and due to the eccentric rotating of string. This research presents results of specific experimental study that was run by using two types of drilling mud (Fresh water Bentonite & Polymer), with/without Nanoparticle size materials of MgO in various ratios and computes the rheological properties of mud for each concentration [Yield point, plastic viscosity, Av, PH, filter loss (30 min), filter cake, Mud Cake Friction, Friction Factor]. These results then were used to find a clear effects of Nanoparticle drilling mud rheology on stick - slip strength by sev
... Show MoreThe performance analyses of 15 kWp (kW peak) Grid -Tied solar PV system (that considered first of its type) implemented at the Training and Energy Research Center Subsidiary of Iraqi Ministry of Electricity in Baghdad city has been achieved. The system consists of 72 modules arranged in 6 strings were each string contains 12 modules connected in series to increase the voltage output while these strings connected in parallel to increase the current output. According to the observed duration, the reference daily yields, array daily yields and final daily yields of this system were (5.9, 4.56, 4.4) kWh/kWp/day respectively. The energy yield was 1585 kWh/kWp/year while the annual total solar irradiation received by solar array system was 198
... Show MoreLaser-Induced Breakdown Spectroscopy (LIBS) has been documented as an Atomic Emission Spectroscopy (AES) technique, utilising laser-induced plasma, in order to analyse elements in materials (gases, liquids and solid). The Nd:YAG laser passively Q-switched at 1064nm and 9ns pulse duration focused by convex lens with focal length 100 mm to generates power density 5.5×1012 Mw/mm2 with optical spectrum in the range 320-740 nm. Four soil samples were brought from different northern region of Iraq, northern region (Beiji, Sherkat, Serjnar and Zerkary).
The soil of the Northern region of Beige, Sherkat, Serjnar and Zarkary has abundant ratios of the elements P [0.08, 0.09, 0.18, 0.18] and Ca [0.61, 0.15, 0.92, 0.92] while it lack of Si [0.0
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More