The response of the combustor’s liner to the air-flow that passes through it is the key reason for the combustion chambers noise, hence the instabilities of those chambers that decreases the mechanical efficiency of such sections, by increased its mechanical vibrations, which increases the failure rate created during originating of the cracks spreading by the shakes producing by the series of high-level frequencies. Accordingly, any work debating the impact of the context of liners in the combustion chamber can provide grasping for the combustion noise generated by the undesirable vibrations, and benefits the industrial firms to design an ideal production procedure which increases the lifespan of the combustor. The goal of this wo
... Show MoreThe response of the combustor’s liner to the air-flow that passes through it is the key reason for the combustion chambers noise, hence the instabilities of those chambers that decreases the mechanical efficiency of such sections, by increased its mechanical vibrations, which increases the failure rate created during originating of the cracks spreading by the shakes producing by the series of high-level frequencies. Accordingly, any work debating the impact of the context of liners in the combustion chamber can provide grasping for the combustion noise generated by the undesirable vibrations, and benefits the industrial firms to design an ideal production procedure which increases the lifespan of the combustor. The goal of this work is
... Show MoreIn this paper, a random transistor-transistor logic signal generator and a synchronization circuit are designed and implemented in lab-scale measurement device independent–quantum key distribution systems. The random operation of the weak coherent sources and the system’s synchronization signals were tested by a time to digital convertor.
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreThis article presents test results documentation for four grouted ground anchors embedded in sandy soil. Three anchors were trial, while one was a working anchor. One trial anchor is instrumented with eight resistance-type strain gauges glued on the corrugated pipe and embedded within the grouted body. An acceptance test was made for all anchors to determine the working load. Acceptance criteria suggested by the Post-Tensioning Institute were applied, and the working anchor did not pass the creep criterion, so it was taken out of service. The strain measurements indicated that the compression stresses were generated along the free length, while the tension stresses were generated alon
This study analyzes how to make use of the resources in the marshlands of Iraq and how to utilize them, especially after the water returns to these areas and they are revitalized. We take an example of AL- Saheen Marsh and plan an ideal tourist resort there. This example can further expand to include other parts of the marshlands. The resort will utilize the local environment and tourist characteristics as it will have a feel and architectural resemblance to the houses and buildings that are currently built there. In addition the transportation methods will be the same as those used by the locals. Yet the resort will still posses all the facilities required by a modern tourist resort that includes all the services that will make
... Show More