Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290 standard guides this study. The software in this package may combine CAD (Computer-Aided Design) and CAE (Computer-Aided Engineering) without requiring extra design applications. This study tested SPCC and SPHC plate materials with five thickness variations. The findings embrace the number of failure risks associated with press bending exhibited on the von Mises stress diagram, which is directly proportional to showing the thickness limit of each material type throughout the bending process. The study's findings lay the groundwork for improving manufacturing quality by lowering the number of faulty goods produced by trial and error. Because the maximum allowable die width is 12 mm, the thickness limit of the press bending process is 2 mm. However, due to the greater intensity of the SPCC material, it has a reduced defect rate compared to SPHC material.
Iraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for
... Show MoreRM Abbas, AA Abdulhameed, AI Salahaldin, International Conference on Geotechnical Engineering, 2010
In this paper the definition of fuzzy anti-normed linear spaces and its basic properties are used to prove some properties of a finite dimensional fuzzy anti-normed linear space.
In this paper, we introduce and discuss an algorithm for the numerical solution of two- dimensional fractional dispersion equation. The algorithm for the numerical solution of this equation is based on explicit finite difference approximation. Consistency, conditional stability, and convergence of this numerical method are described. Finally, numerical example is presented to show the dispersion behavior according to the order of the fractional derivative and we demonstrate that our explicit finite difference approximation is a computationally efficient method for solving two-dimensional fractional dispersion equation
In this paper, the finite difference method is used to solve fractional hyperbolic partial differential equations, by modifying the associated explicit and implicit difference methods used to solve fractional partial differential equation. A comparison with the exact solution is presented and the results are given in tabulated form in order to give a good comparison with the exact solution
The study aimed to reveal the level to which the international issues are integrated into the books of Saudi public education social studies and citizenship in the light of the principles of international education, and to know the level of continuity and integration of these issues in the books, to build a range and sequence matrix of international issues through it. The study followed the descriptive and analytical method that used the content analysis card as a tool for study when the tool achieved the necessary validity and reliability characteristics. The data of this study has been processed using the SPSS statistical program according to a set of appropriate methods of descriptive and inferential statistics.
The resu
... Show MoreRecent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using
... Show MoreAs a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More