Linear motor offers several features in many applications that require linear motion. Nevertheless, the presence of cogging force can deteriorate the thrust of a permanent magnet linear motor. Using several methodologies, a design of synchronous single sided linear iron-core motor was proposed. According to exact formulas with surface-mounted magnets and concentrated winding specification, which are relying on geometrical parameters. Two-dimensional performance analysis of the designed model and its multi-objective optimization were accomplished as a method to reduce the motor cogging force using MAXWELL ANSYS. The optimum model design results showed that the maximum force ripple was approximatrly reduced by 81.24%compared to the original model with a smaller ripple coefficient of 0.22. Likewise, the model was redesigned taking into consideration two cases; laminated core and solid core. It was found that the error between the analytical and numerical results of the output force did not exceed 0.0967%.
A field-pilot scale slow sand filter (SSF) was constructed at Al-Rustamiya Sewage Treatment Plant (STP) in Baghdad city to investigate the removal efficiency in terms of Biochemical Oxygen Demand (BOD5), Chemical oxygen demand (COD), Total Suspended Solids (TSS) and Chloride concentrations for achieving better secondary effluent quality from this treatment plant. The SSF was designed at a 0.2 m/h filtration rate with filter area 1 m2 and total filter depth of 2.3 m. A filter sand media 0.35 mm in size and 1 m depth was supported by 0.2 m layer of gravel of size 5 mm. The secondary effluent from Al-Rustamiya STP was used as the influent to the slow sand filter. The results showed that the removal of BOD5, COD, TSS, and Chloride were
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreHumor is an interesting phenomenon that has been studied widely, yet it is considered a universal trait that cannot be an old subject for a study. This study is conducted to investigate humor from a universal pragmatic lens in a stand-up comedy show, namely, You Wanna Hear Something Crazy?. It aims to study humor as a coin with two sides, the production side and the understanding side. To achieve the aim of the study, the researchers use an eclectic contains Grice’s CP model (1975) and Habermas’s UP model (1979, 1984, 1987, 1998). The study has noted that while using the observance and the non-observance of the cooperative maxims to produce humor, the universal validity claims of truth, sincerity, and normative rightness for rea
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreThere are serious environmental problems in all countries of the world, due to the waste material such as crushed clay bricks (CCB) and in huge quantities resulting from the demolition of buildings. In order to reduce the effects of this problem as well as to preserve natural resources, it is possible to work on recycling (CCB) and to use it in the manufacture of environmentally friendly loaded building units by replacing percentages in coarse aggregate by volume. It can be used as a powder and replacing of percentages in cement by weight and study the effect on the physical and mechanical properties of the concrete and the masonry unit. Evaluation of its performance through workability, dry density, compressive strength, thermal conduct
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThis research deals with the nature of the Turkish attitude towards the events of the Arab Spring which the Arab region witnessed recently, as this attitude is characterized by hesitation and utter confusion about those events at its beginning. However, the development of events and the consequent repercussions led the Turkish decision makers of the foreign policy to reconsider their attitude towards those events for political, economic, cultural and social motives.
A standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.