Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference after each test is immediately measured to
find the losing weight and wear rate for each specimen. Wear test was monitored online by two
sensors, force sensor to control the applied load, find friction force and coefficient of friction. The
sensor is an acoustic emission to detect crack initiations of the worn surface by transfers the emitted
ultrasonic waves from crack initiations to electric signals. Scanning electron microscope has been
used to examine the worn surfaces. The overall results include that the effect of pores depends on pore
shapes, sizes and concentrations.
Beta-irradiation effects on the microstructure of LDPE samples have been investigated
using Positron Annihilation Lifetime Technique (PALT). These effects on the orthopositronium
(o-Ps) Lifetime t3, the free positron annihilation lifetime 2 t , the free-volume
hole size (Vh) and the free volume fraction (fh) were measured as functions of Beta
irradiation - dose up to a total dose of 30.28 kGy.
The results show that the values of t3, Vh and fh increase gradually with increasing Beta
dose up to a total dose of 1.289 kGy, and reach a maximum increment of 17.4%, 32.8% and
5.86%, respectively, while t2 reachs maximum increment of 211.9% at a total dose of 1.59
kGy. Above these doses, the values show nonlinear changes u
Matrix acidizing is a good stimulation process in which acid is introduced into the reservoir near the wellbore area via the wellbore or coil tubing. In the oil industry, formation damage is a prevalent problem. Bypassing wellbore damage by producing wormholes in carbonate reservoirs is the main purpose of acidizing the matrix of the formation. When doing lab tests, scientists are looking for a wormhole-inducing injection rate that can be used in the field. Meantime the ongoing works on the Ahdeb oil field's Mishrif reservoir, several reports have documented the difficulties encountered during stimulation operations, including high injection pressures that make it difficult to inject acid into the reservoir formation; and only a few
... Show MoreBN RASHİD, 2023
Pultruded materials made of Fiber-Reinforced Polymer (FRP) come in a broad range of shapes, such as bars, I-sections, C-sections, etc. FRP materials are starting to compete with steel as structural materials owing to their great resistance, low self-weight, and cheap maintenance costs, especially in corrosive conditions. This study aims to evaluate the effectiveness of a novel concrete Composite Column (CC) using Encased I-Section (EIS) as a reinforcement in contrast to traditional steel bars by using Glass Fiber-Reinforced Polymer (GFRP) as I-section (CC-EIS) to evaluate the effectiveness of the hybrid columns which have been built by combining GFRP profiles with concrete columns. To achieve the aims of this study, nine circular co
... Show MoreThe objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc
... Show More
Experimental investigation of the influence of inserting the metal foam to the solar chimney to induce natural ventilation are described and analyzed in this work. To carry out the experimental test, two identical solar chimneys (without insertion of metal foam and with insertion of metal foam) are designed and placed facing south with dimensions of length× width× air gap (2 m× 1 m× 0.2 m). Four incline angles are tested (20o,30o,45o,60o) for each chimney in Baghdad climate condition (33.3o latitude, 44.4o longitude) on October, November, December 2018. The solar chimney performance is investigated by experimentally recording absorber pl
... Show MoreThe influence of adding metal foam fins on the heat transfer characteristics of an air to water double pipe heat exchanger is numerically investigated. The hot fluid is water which flows in the inner cylinder whereas the cold fluid is air which circulates in the annular gap in parallel flow with water. Ten fins of metal foam (Porosity = 0.93), are added in the gap between the two cylinder, and distributed periodically with the axial distance. Finite volume method is used to solve the governing equations in porous and non-porous regions. The numerical investigations cover three values for Reynolds number (1000 ,1500, 2000), and Darcy number (1 x10-1, 1 x10-2, 1x10-3). The comparison betwee
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More