Abstract
This paper represents a study of the effect of the soil type, the drilling parameters and the drilling tool properties on the dynamic vibrational behavior of the drilling rig and its assessment in the drilling system. So first, an experimental drilling rig was designed and constructed to embrace the numerical work.
The experimental work included implementation of the drill-string in different types of soil with different properties according to the difference in the grains size, at different rotational speeds (RPM), and different weights on bit (WOB) (Thrust force), in a way that allows establishing the charts that correlate the vibration acceleration, the rate of penetration (ROP), and the power
... Show MoreFluid-structure interaction method is performed to predict the dynamic characteristics of axial fan system. A fluid-structure interface physical environment method (monolithic method) is used to couple the fluid flow solver with the structural solver. The integration of the three-dimensional Navier-Stokes equations is performed in the time Doman, simultaneously to the integration of the three dimensional structural model. The aerodynamic loads are transfer from the flow to structure and the coupling step is repeated within each time step, until the flow solution and the structural solution have converged to yield a coupled solution of the aeroelastic set of equations. Finite element method is applied to solve numerically
... Show MoreA review of the literature on intellectual capital development was conducted using systemic criteria for the inclusion of relevant studies. The concepts behind the ideas explored in the present study were discussed in respect to the subject matter. Examining the past state of the art in the intellectual capital sector for achieving high levels of innovation performance provided a multidimensional picture of intellectual capital, innovation performance, and dynamic capabilities. The present review was designed to illustrate the correlation between intellectual capital and innovation performance, as well as the role of dynamic capabilities in moderating the relationship between these constructs. Accordingly, we presented an extensive
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Abstract:
Research Topic: Ruling on the sale of big data
Its objectives: a statement of what it is, importance, source and governance.
The methodology of the curriculum is inductive, comparative and critical
One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it
Recommendation: Follow-up of studies dealing with the provisions of the issue
Subject Terms
Judgment, Sale, Data, Mega, Sayings, Jurists
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBackground: Mobile phones are approximately widely used everywhere like in hospital wards, clinics and universities as well as biomedical laboratories. They have become very important tool in students’ life. In contrast, these tools carry many harmful bacteria which are responsible for infectious diseases in human because they serve as a reservoir for different pathogens. Current study was aimed to isolate bacteria from students’ mobile phones at the Institute of Medical Technology/Al-Mansour/The Middle Technical University, Baghdad, Iraq. Also, the study investigated microbial resistance to many antimicrobial agents as well as the appropriate remedial measures. Method: Four hundred and fifty swabs from mobile phones were collected from
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show Moreplanning is among the most significant in the field of robotics research. As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the
... Show More