Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference after each test is immediately measured to
find the losing weight and wear rate for each specimen. Wear test was monitored online by two
sensors, force sensor to control the applied load, find friction force and coefficient of friction. The
sensor is an acoustic emission to detect crack initiations of the worn surface by transfers the emitted
ultrasonic waves from crack initiations to electric signals. Scanning electron microscope has been
used to examine the worn surfaces. The overall results include that the effect of pores depends on pore
shapes, sizes and concentrations.
This book in our hands is a 'book in the science of rhymes' written by the linguistic and grammatical world 'Othman bin Jenni' 'T 392 AH', and included in it: the concept of rhyme, its characters, movements, and disadvantages, with mention of its ramifications, defining them by definition, clarification and martyrdom poetry, It is concise in size, but it is a book containing a full science in its content.
The study was divided into two parts, the first: the study, and included a study of the author and the author, I talked first about his life, such as his name and origin, and scientific status, and the words of scientists in it, and so on, and secondly: the name of the book, and his percentage, and the time of its composition, etc. I
Climate change in recent years has greatly affected the distribution of ground covers. Monitoring these changes has become very easy due to the development of remote sensitivity science and the use of satellites to monitor these changes. The aim of this research is to monitor changes in the spectral reflectivity of the Baghdad governorate center for the month (March, June, September, December) of the year 2021 using remote sensing and satellite images Sentinel 2 and knowing the climate imact on them. Fifty-one samples were selected for four types of ground cover (agricultural land, water, buildings and open space) and their spectral reflectivity was calculated using satellite images.
This investigation was carried out to study the treatment and recycling of wastewater in the Battery industry for an effluent containing lead ion. The reuse of such effluent can only be made possible by appropriate treatment method such as electro coagulation.
The electrochemical process, which uses a cell comprised aluminum electrode as anode and stainless steel electrode as cathode was applied to simulated wastewater containing lead ion in concentration 30 – 120 mg/l, at different operational conditions such as current density 0.4-1.2 mA/cm2, pH 6 -10 , and time 10 - 180 minute.
The results showed that the best operating conditions for complete lead removal (100%) at maximum concentration 120 mg/l was found to be 1.2 mA/cm2 cur
The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables