Micro metal forming has an application potential in different industrial fields. Flexible tool-assisted sheet metal forming at micro scale is among the forming techniques that have increasingly attracted wide attention of researchers. This forming process is a suitable technique for producing micro components because of its inexpensive process, high quality products and relatively high production rate. This study presents a novel micro deep drawing technique through using floating ring as an assistant die with flexible pad as a main die. The floating ring designed with specified geometry is located between the process workpiece and the rubber pad. The function of the floating ring in this work is to produce SS304 micro cups with profile radius precision as required as possible. The finite element simulations are accomplished using the commercial code Abaqus/Standard. In order to verify the simulation models, micro deep drawing experiments are carried out using a special set up developed specifically to meet the requirements of the simulations. The results revealed that the proposed technique is feasible to be adopted for producing micro cups with remarkable application capability in miniaturization technology.
The Gas Assisted Gravity Drainage (GAGD) process has become one of the most important processes to enhance oil recovery in both secondary and tertiary recovery stages and through immiscible and miscible modes. Its advantages came from the ability to provide gravity-stable oil displacement for improving oil recovery, when compared with conventional gas injection methods such as Continuous Gas Injection (CGI) and Water – Alternative Gas (WAG). Vertical injectors for CO2 gas were placed at the top of the reservoir to form a gas cap which drives the oil towards the horizontal oil producing wells which are located above the oil-water-contact. The GAGD process was developed and tested in vertical wells to increase oil r
... Show MoreThis paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
Incorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co
... Show MoreIn the theoretical part, removal of direct yellow 8 (DY8) from water solution was accomplished using Bentonite Clay as an adsorbent. Under batch adsorption, the adsorption was observed as a function of contact time, adsorbent dosage, pH, and temperature. The equilibrium data were fitted with the Langmuir and Freundlich adsorption models, and the linear regression coefficient R2 was used to determine the best fitting isotherm model. thermodynamic parameters of the ongoing adsorption mechanism, such as Gibb's free energy, enthalpy, and entropy, have also been measured. The batch method was also used for the kinetic calculations, and the day's adsorption assumes first-order rate kinetics. The kinetic studies also show that the intrapar
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show Moreالاستثمار الاجنبي المباشر في العراق ودوره في تحقيق التنمية الاقتصادية
This study aimed to clarify the importance of ecological taxation in achieving sustainable development, by analyzing a set of economic measures such as taxes, taxes levied by the legislation in the field of ecology, to fight against pollution. And we tried to evaluate this initiative in Algeria. The results of the study showed that economic measures of ecological taxation contribute to achieving sustainable development, and Although Algeria has adopted a series of ecological tax mechanisms, it is far from keeping pace with developments in this area.