Preferred Language
Articles
/
4hZf74oBVTCNdQwC5ajr
STUDY ON THE PARAMETER OPTIMIZATION INMAGNETIC ABRASIVE POLISHING FORBRASS CUZN33PLATE USING TAGUCHI METHOD
...Show More Authors

This paper describes a new finishing process using magnetic abrasives were newly made to finish effectively brass plate that is very difficult to be polished by the conventional machining processes. Taguchi experimental design method was adopted for evaluating the effect of the process parameters on the improvement of the surface roughness and hardness by the magnetic abrasive polishing. The process parameters are: the applied current to the inductor, the working gap between the workpiece and the inductor, the rotational speed and the volume of powder. The analysis of variance(ANOVA) was analyzed using statistical software to identify the optimal conditions for better surface roughness and hardness. Regressions models based on statistical mathematical approach by using the MINITAB-statistical software for both surface roughness and hardness were obtained. Experimental results indicated that rotational speed is the most significant parameters on change in surface roughness(ΔRa), and for change in surface hardness (ΔHa), volume of powder is the significant one. As a result, it was seen that the magnetic abrasive polishing was very useful for finishing the brass alloy plate.

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On S-acts and bounded linear operators
...Show More Authors

The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi National Journal Of Chemistry
Adsorption of Cefixime on to Iraqi Bentonite
...Show More Authors

In this study the adsorption of cefixime on to selected Iraqi clay bentonite. The aim of this study is to search for selective active surface in adsorption of the drug and to act as physical antidotes in treatment of poisoning if the drug is taken in quantities higher than the recommended dosages. Quantitative estimation of the drug adsorption has been done by utilizing the technique of UV spectrophotometry in λmax (273) nm at different conditions of temperature (25, 37, 45) ˚C found the adsorption decrease with increase the temperature. Study of clay weight of bentonite (0.1-1.5) gm found the adsorption increase with increase of clay weight, study effect of pH (1.2, 3, 5, 7) on adsorption of bentonite found the optimum adsorption

... Show More
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
On Shrunken Estimation of Generalized Exponential Distribution
...Show More Authors

This paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.

The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Effect of Ochratoxin-A on Mouse Embryos
...Show More Authors

This study sought to determine malformation caused by Ochratoxin-A (OTA) on mouse embryos. Twenty adult female white Swiss mice (mus msculus) were divided into four groups, with five females per group, and with one male placed with two females in a cage. Avaginal plug was observed in the early morning and the day of mating was considered as day of pregnancy followed by the first day of pregnancy. Three sub lethal concentrations of OTA were applied to the respective groups (other than the control), 1mg/kg, 2mg/kg and 4mg/kg. The animals were given 0.1 ml per 10 gm body weight per concentration of OTA once a day during days 7-14 of pregnancy. The control group animals were given distilled water. The pregnant mice were dissected, and the embry

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Simulation on Rotation Curve of Spiral Galaxies
...Show More Authors
Abstract<p>The problem of dark matter in galaxies is still one of the most important unsolved problems in the contemporary extragalactic astronomy and cosmology. The existence of a significant dynamic difference between the visible mass and the conventional mass of galaxies firmly establishes observational result. In this paper an unconventional explanation will be tested as an alternative to the cold dark matter hypothesis; which is called the modified Newtonian dynamics (MOND).</p><p>In this paper covers the simulation of galactic evolutions; where the two hypotheses are tested via the rotation curves. N-body simulation was carried adopting different configuration lik</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Apr 06 2017
Journal Name
Global Journal Of Engineering Science And Researches 4(2348-8034):48-52
ON SEMI-STRONG (WEAK)CJ-TOPLOGICAL SPACES
...Show More Authors

Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref