In present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.
In this paper, a dynamic investigation is done for strip, rectangular and square machine foundation at the top surface of two-layer dry sand with various states (i.e., loose on medium sand and dense on medium sand). The dynamic investigation is performed numerically using finite element programming, PLAXIS 3D. The soil is expected as a versatile totally plastic material that complies with the Mohr-Coulomb yield criterion. A harmonic load is applied at the base with an amplitude of 6 kPa at a frequency of (2 and 6) Hz, and seismic is applied with acceleration – time input of earthquake hit Halabjah city north of Iraq. A parametric study is done to evaluate the influence of changing L/B ratio (Length=12,6,3 m and width=3 m), type of sand
... Show MoreIn this paper investigate the influences of dissolved CO2/H2S gases, crude oil velocity and temperature on the rate of corrosion of crude oil transmission pipelines of Maysan oil fields southern Iraq. The Potentiostatic corrosion test technique was conducted into two types of carbon steel pipeline (materials API 5L X60 and API 5L X80). The computer software ECE electronic corrosion engineer was used to predict the influences of CO2 partial pressure, the composition of crude oil, flow velocity of crude oil and percentage of material elements of carbon steel on the rate of corrosion. As a result, the carbon steel API 5L X80 indicates good and appropriate resistance to corrosion compared to carbon steel API
... Show MoreCutaneous leishmaniasis is a disease caused by Leishmania tropica parasite. Current treatments for this parasite are undesirable because of their toxicity, resistance, and high cost. Macrophages are key players against pathogens. Nitric oxide (NO), a molecule produce by immune cells, controls intracellular killing of pathogens during infection. Silver nanoparticles (Ag NPs) demonstrated broad-spectrum activity against various types of infectious diseases. It has the ability to stimulate oxygen species production. This study aims to analyze the macrophages activation through NO production and estimate the cytotoxicity based on the lactate dehydrogenase (LDH) release upon exposure to L. tropica and
... Show MoreThe CO2-Assisted Gravity Drainage process (GAGD) has been introduced to become one of the mostinfluential process to enhance oil recovery (EOR) methods in both secondary and tertiary recovery through immiscibleand miscible mode. Its advantages came from the ability of this process to provide gravity-stable oil displacement forenhancing oil recovery. Vertical injectors for CO2 gas have been placed at the crest of the pay zone to form a gas capwhich drain the oil towards the horizontal producing oil wells located above the oil-water-contact. The advantage ofhorizontal well is to provide big drainage area and small pressure drawdown due to the long penetration. Manysimulation and physical models of CO2-AGD process have been implemented
... Show MoreABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreIn this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More
