The performance of a diesel engine was tested with diesel oil contaminated with glycol at the engineering workshop/Department of Agricultural Machines and Equipment / College of the Agricultural Engineering Sciences at the University of Baghdad. To investigate the impact of different concentrations of glycol on the performance of a diesel engine, an experimental water-cooled four-stroke motor was utilized, with oil containing 0, 100, and 200 parts per million (ppm). Specific fuel consumption, thermal efficiency, friction power, and exhaust gas temperature were examined as performance indicators. To compare the significance of the treatments, the study employed a full randomization design (CRD), with three replicates for each treatment at the 5% probability level. Experiment results demonstrated significant variations in the characteristics under study. For example, the highest rates of Brake-specific fuel consumption (kg/KW.h) (0.4459), frictional power (7.8837 kW), and exhaust gas temperature (173.6 0 C) were all observed at oil contamination levels of 200 ppm glycol. Meanwhile, the Brake thermal efficiency was the lowest of any measured system at only 17.5623%. Glycol oil pollution was shown to have a considerable effect on engine performance.
Two of the main advantages of segmental construction are economics, as well as the rapid construction technique. One of the forms of segmental construction, for structural elements, is the segmental beams that built-in short sections, which referred to segments. This research aims to exhibit a new technique for the fabrication of short-span segmental beams from wedge-shaped concrete segments and carbon fiber reinforced polymers (CFRP) in laminate form. The experimental campaign included eight short-span segmental beams. In this study, two selected parameters were considered. These parameters are; the number of layers of CFRP laminates and the adhesive material that used to bond segments to each other, forming short-span segmental be
... Show MoreThis experimental study demonstrates the gable-reinforced concrete beams’ behavior with several number of openings (six and eight) and posts’ inclination, aimed to find the strength reduction in this type of beam. The major results found are: for the openings extending over similar beam length it is better to increase the number of posts (openings),
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThis paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show MoreThe educational function of television is one of the basic functions in light of the technical development that included the specialized satellite channels in all its fields, including the educational field, as its role became parallel to the role of educational institutions. These studies are among the descriptive studies in terms of the type of study methodology that describes the phenomenon, interprets its and extract the results and relationships between the variables. The study sample was multistage (random and intentional) included the students of the sixth academic and literary preparatory stage in the city of Baghdad.
The study problem was summarized by the following main question:
( What are the motives for the exposure of
The unexpected death of humans due to a lack of medical care is a serious problem. Additionally, the number of elderly people requiring continuous care is increasing. A global aging population poses a challenge to the sustainability of conventional healthcare systems for the future. Simultaneously, recent years have seen remarkable progress in the Internet of Things (IoT) and communication technologies, alongside the growing importance of artificial intelligence (AI) explainability and information fusion. Therefore, developing smart healthcare systems based on IoT and advanced technologies is crucial. This would open up new possibilities for efficient and intelligent medical system
Alizarin is one of the popularly used and wide separated compounds with a chemical name (1,2- dihydroxy-9,10-anthraquinone) which belong to the anthraquinones family that contain three aromatic conjugated rings and in the central rings it contains two ketonic groups.1
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More