In this study, active knife and fixed knife of single-row disc silage machine has three different clearance C1, C2 and C3 (1, 3 and 5 mm) and it is tried in three different working speed V1, V2 and V3 (1.8, 2.5 and 3.7 km / h) and PTO speed (540 min-1) and machine's fuel consumption (l/h), average power consumption (kW), field energy consumption (kW/da), product energy consumption (kW/t), field working capacity (da/h), product working capacity (t/h) and Chopping size distribution characteristics of the fragmented material were determined. It has been found that knife-counter knife clearances smaller than 3 mm (1 mm) and larger (5 mm) have a negative effect on machine performance in general. In terms of fuel and power consumptions, the most suitable combination of work was C2V1, and in terms of field-product energy consumption, C2V3 combination was found to be optimal. The highest field-product working capacity was achieved at the V3 working speed. In terms of silage mincer size, all working combinations gave the appropriate shredding length distribution; especially the 1st knife-counter knife clearance (1 mm) was determined to give a more suitable Chopping size distribution in terms of animal feeding. In the second clearance (3mm), both the energy consumption and the Chopping size distribution were positive.
Sand dunes are spread in multiple places in the world especially in a desert area as a result of economic development and construction processes, there was a need to study the behavior of sand dunes and make it suitable for construction. This paper aims to study the effect of adding sodium silicate on the cohesion strength of sand dune and its behavior. The results show that the cohesion strength increase as a percentage of sodium silicate increase (addition 8% Sodium silicate show the higher cohesion) and the cohesion between sand dune particles increase excepted when using 10% sodium silicate the cohesion began to decrease. However, the effect of curing time is significant and shows
A hand lay-up method was used to prepare Epoxy/ metal composites. Epoxy resin (EP) was used as a matrix with metal particles (Al, Cu, and Fe) as fillers.
The preparation method includes preparing square panels of composites with different weight percentage of fillers (10, 20, 30, 40, and 50%). Standard specimens (88mm in diameter) for thermal conductivity tests were prepared to measure thermal conductivity kexp.The result of experimental thermal conductivity kexp, for EP/metal composites show that, kexp increase with increasing weight percentage, For EP/ Al and EP/Cu composites, and it have have maximum values of 0.33 and 0.35 W/m.K, respectively. While kexp for EP/ Fe composite show slight increase with maximum value of 0.186 W/m.K.
The research aims at identifyiny the effect of (Danials Model) in concepts Acquisition of Education Principles on Students at college at Education The total unmber of Students , is (65) male and female Students distributed in two groups . The First group is the experiemental group which is taught the (Danials Model) and is (34) Students . The second groupe is the control group which is taught the traditional method of teaching and it is (31) Students . The researcher has matcheol between the two groupe by the following variables : the age , (in monthes) their intelligence their parents a cademic leve of education . The research has constructed a test of (20) items of multiple choice test . The reliability of The test has been cal
... Show MoreBackground: This in vitro study was carried out to evaluate the effect of various endodontic irrigants (sodium hypochlorite, ethylene diaminetetracetic acid and normal saline) on sealing ability of (Biodentine, mineral trioxide aggregate, and amalgam) used to repair furcal perforations. Material and methods: One hundred and twenty extracted human molars with divergent roots were used in this study. A standard root canal access cavity was prepared in each tooth and furcal perforation was made and was standardized by using k file size 100 instrument to get a perforation of (1.32mm) in diameter .The teeth were randomly divided in to three groups of 40 teeth according to the type of material used to repair the perforations (Group A: The furcal
... Show MoreThe aim of the research was designing a nutritional program with amino acids well as designing exercises for muscular strength training for youth female badminton players. In addition to that the researcher aimed at identifying the effect of amino acid accompanied with muscular training on some physiological indicators in youth female badminton players. The researcher used the experimental method. The subjects were (7) youth female badminton players from the Armenian badminton club. Many physiological tests were conducted including PWC170 and Vo2Max. The data was collected and treated using proper statistical operations to conclude that amino acid accompanied with muscular ability training have a positive effect on some physiological indica
... Show MoreObjective: In this study ,the effects of silver nanoparticles (Ag NPs)were investigated on the liver and kidney tissues. Methodology: The produced nanoparticles have an average particle size of about 30 nm. Eighteen male albino rats were used by dividing them into three groups, each group comprise 6 rats. First group(control group) given food and water like other groups by liberty. Second group was tail injected by (AgNPs) at dose of (0.4 mg/kg. body weight/day). Third group was injected by (AgNPs) at dose of (0.6 mg/kg. body weight/day) for 15 days. All animals were sacrified at the end of experiment. The liver and kidney tissues specimens were fixed in 10% formalin and histological preparations were carried out then stained with H&E. Path
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper