Electrical Discharge Machining (EDM) is a widespread Nontraditional Machining (NTM) processes for manufacturing of a complicated geometry or very hard metals parts that are difficult to machine by traditional machining operations. Electrical discharge machining is a material removal (MR) process characterized by using electrical discharge erosion. This paper discusses the optimal parameters of EDM on high-speed steel (HSS) AISI M2 as a workpiece using copper and brass as an electrode. The input parameters used for experimental work are current (10, 24 and 42 A), pulse on time (100, 150 and 200 µs), and pulse off time (4, 12 and 25 µs) that have effect on the material removal rate (MRR), electrode wear rate (EWR) and wear ratio (WR). A
... Show MoreThe cytotoxicity of different concentrations of purified methionine γ- lyase from Pseudomonas putida on cancer cell lines (RD, AMN3 and AMGM) at 96 hr was studied. The bacterial enzyme with concentration 1000µg/ml was revealed highly cytotoxicity against cancer cell lines in comparison with other concentrations whereas slight cytotoxicity was observed on normal cell (REF).
Clean water supply is one of the major factors contributing significantly to society’s socio-economic transformation by improving living standards, health, and increasing productivity. It is imperative to plan and construct appropriate water supply systems in modern society, which supply various segments of society with safe drinking water according to their requirements to ensure adequate and quality water supply. In the current study, here was an attempt to develop a model for geographic information systems to manage the assets of the water distribution networks in the Karrada region and to evaluate the network geometrically, and from the results of the engineering analysis of the
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis work aimed to investigate the prevalence of pathogenic fungi and evaluate the antifungal activity of Trichoderma orientale FMR12486 crude extract against pathogenic fungi isolated from patients attending the National Center for Thoracic and Respiratory Diseases (having a history of tuberculosis) and consultant of Dermatology of Baghdad hospital, Iraq. A total of 80 clinical specimens were collected: 20 skin scrapings specimens and 60 sputum specimens. The results of direct examination by KOH 10% and culture showed that 11 (55%) cases from 20 skin specimens were positive for fungal infections, while in the sputum specimens, 28 (47%) cases from 60 were positive. Candida albicans represented the most common fungal infection isolat
... Show MoreLet
For more than a decade, externally bonded carbon fiber reinforced polymer (CFRP) composites successfully utilized in retrofitting reinforced concrete structural elements. The function of CFRP reinforcement in increasing the ductility of reinforced concrete (RC) beam is essential in such members. Flexural and shear behaviors, ductility, and confinement were the main studied properties that used the CFRP as a strengthening material. However, limited attention has been paid to investigate the energy absorption of torsion strengthening of concrete members, especially two-span concrete beams. Hence, the target of this work is to investigate the effectiveness of CFRP-strengthening technique with regard to energy absorption of two-span RC
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those
... Show More