In this study, performance characteristics such as power take off (PTO) power consumption, fuel consumption, fuel consumption for the unit field-unit product were determined at different working speeds with two different PTO applications (540 and 540E) in a single row disc type silage machine. In particular, the 540E PTO application greatly reduces fuel consumption for unit work. The best results in terms of hourly fuel consumption were achieved in 540E PTO application and V1 working speed. When the field - product fuel consumption is evaluated, the best results were obtained with the 540E PTO application at the V3 working speed. When an evaluation is made considering all the parameters, it is concluded that the 540E PTO application will provide certain advantages in terms of fuel consumption compared to the 540 PTO application for the silage machine operating by taking the motion from PTO. 540E PTO application can be used as an important alternative to 540 PTO application for machines of similar capacity and features.
LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreIn this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show MoreIA Ali, FK Emran, DF Salloom, Annals of the Romanian Society for Cell Biology, 2021
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreAn electrocoagulation process has been used to eliminate the chemical oxygen demand (COD) from wastewaters discharged from the Al-Muthanna petroleum refinery plant. In this process, a circular aluminum bar was used as a sacrificial anode, and hallow cylinder made from stainless steel was used as a cathode in a tubular batch electrochemical Reactor. Impacts of the operating factors like current density (5-25mAcm-2), NaCl addition at concentrations (0-2g/l), and pH at values (3-11) on the COD removal efficiency were studied.
Results revealed that the increase in current density increases the COD removal efficiency, whereas an increase