Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference after each test is immediately measured to
find the losing weight and wear rate for each specimen. Wear test was monitored online by two
sensors, force sensor to control the applied load, find friction force and coefficient of friction. The
sensor is an acoustic emission to detect crack initiations of the worn surface by transfers the emitted
ultrasonic waves from crack initiations to electric signals. Scanning electron microscope has been
used to examine the worn surfaces. The overall results include that the effect of pores depends on pore
shapes, sizes and concentrations.
Monetary policy occupies a prominent role in achieving monetary stability by adjusting the growth rates of the number of available means of payment in line with changes in the size of the gross domestic product in the country and expressed by the monetary stability coefficient agreed upon by the International Monetary Fund, a term that hides the fact that there is a rate of change in the volume of commodity or real production which expresses the levels of aggregate supply in the economy, which corresponds to the quantities of cash in circulation, which represent a net purchasing power and stimulate aggregate demand, which completes the picture of the existence of the market mechanism, expressed by the monetary or economic stability
... Show MoreThe reactions of ozone with 2,3-Dimethyl-2-Butene (CH3)2C=C(CH3)2 and 1,3-Butadiene CH2=CHCH=CH2 have been investigated under atmospheric conditions at 298±3K in air using both relative and absolute rate techniques, and the measured rate coefficients are found to be in good agreement in both techniques used. The obtained results show the addition of ozone to the double bond in these compounds and how it acts as function of the methyl group substituent situated on the double bond. The yields of all the main products have been determined using FTIR and GC-FID and the product studies of these reactions establish a very good idea for the decomposition pathways for the primary formed compounds (ozonides) and give a good information for the effe
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreThis paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreIn this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
The research aims to investigate the effects of GMAW or MIG welding process on the mechanical properties of dissimilar aluminum alloys 2024-T351 and AA 6061- T651. A series of experimental techniques have been conducted to evaluate mechanical properties of the alloys, by carrying out hardness, tensile and bending tests for welded and un-welded specimens.
Metal inert gas (MIG) has been carried out on sheet metal using ER- 4043(AlSi5) as a filler metal and argon as shielded gas. The welded joints were tested by X-ray radiography and Faulty pieces were excluded.
Welding joints without defects are subjected to heat treatment including heating the joints in furnace to 170 °C for half an hour then air cooling to rel
... Show MoreThe pre - equilibrium and equilibrium double differential cross
sections are calculated at different energies using Kalbach Systematic
approach in terms of Exciton model with Feshbach, Kerman and
Koonin (FKK) statistical theory. The angular distribution of nucleons
and light nuclei on 27Al target nuclei, at emission energy in the center
of mass system, are considered, using the Multistep Compound
(MSC) and Multistep Direct (MSD) reactions. The two-component
exciton model with different corrections have been implemented in
calculating the particle-hole state density towards calculating the
transition rates of the possible reactions and follow up the calculation
the differential cross-sections, that include MS