The importance of vibrations in rotating rotors in engineering applications has been examined, as has the best approach to interpreting vibration data. The most extensively used analytical approaches for rotating shaft vibration analysis have been investigated. In this research, a detailed study was made of the Rayleigh and Dunkerley methods due to their importance in the special calculations to find the amplitude of vibrations in the rotation system. The multi-node method was used to calculate both Dunkerley's and Rayleigh's methods. An experimental platform was built to study the vibrations that occur in the rotating shafts, and the results were compared with theoretical calculations and with different distances of the bearings. It proved that there is very little error between the experimental and theoretical results. The vibration signal from the sensors was analyzed using the LABVIEW program. Rayleigh's method was compared to the exact method, and it was considered the most accurate method. It was found that it made very little difference, up to about 0.06%. As for the Dunkerley method, the difference between it and the proper method is about 4%, which is acceptable. Then a comparison was made between Rayleigh's and Dunkerley's methods, and it was found that Dunkerley's method is the most appropriate in the calculations.
Abstract
The increasing of some traded Agricultural crops prices coincide with the increasing of crude oil prices in global market since the beginning of 21st century which indicate the possibility of short run and long run causality relation between the imported economic variables. The study aims to analysis the causality effects between some of Agricultural crops prices imported by Iraq and the prices of crude oil and Iraq dinar exchange rate in global markets for period (2004:1 -2016:4) theory for developing the adequate price and economic police for Iraqi economic sector. The results show the existence of short- run and long- run between the eco
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreNew series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe present work reports the performance of three types of polyethersulfone (PES) membrane in the removal of highly polluting and toxic lead Pb2+ and cadmium Cd2+ ions from a single salt. This study investigated the effect of operating variables, including pH, types of PES membrane, and feed concentration, on the separation process. The transport parameters and mass transfer coefficient (k) of the membranes were estimated using the combined film theory-solution-diffusion (CFSD), combined film theory-Spiegler-Kedem (CFSK), and combined film theory-finely-porous (CFFP) membrane transport models. Various parameters were used to estimate the enrichment factors, concentration polarization modulus, and Péclet number. The pH values signif
... Show MoreThe present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show MorePraise be to God, and may blessings and peace be upon the Messenger of God, his family and companions, and from his family and after ...
It is the right of every nation to be proud of its heritage, science and civilization among the nations, taking pride in the efforts of its construction and the keenness of its scholars and dedication to serve their nation and their history, and from the great sciences that boast and honor our great nation and distinguish it over others the science of attribution and the preservation of the novel over generations and ages. The novel is preserved from the plagiarism of the nullified, the excess of the deceitful and the liars, and the science of isnad from religion as the scholars said, and without the
Praise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani
... Show MoreThe spread of drugs in Iraq during the period 1932-1968 was one of the most dangerous. phenomena affecting humans, as it leads to addiction, to the point where people cannot live without it, it also leads to the destruction of the user's nerves and body, and the inability to maintain balance, or even perform daily tasks. There are different types of drugs, and the side effects vary from one type to another However in all cases, drugs remain the scourge of the world, They are a toxic substance that attacks the nerves and tries to destroy them' The importance of the subject lies in the fact that it is anew and unstudied topic, and it studies a phenomenon that affects humanity in general and Iraq in Particular through it light can be shed on t
... Show More