Preferred Language
Articles
/
HRf-0pMBVTCNdQwCb-uM
The Design and Experimental Realization of a Laser-Based Heating System Using Recycled Laser Module
...Show More Authors

Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable

View Publication
Publication Date
Thu Mar 14 2019
Journal Name
Al-khwarizmi Engineering Journal
Sculptured Surface Design and Implementation by Lofting Design Method Using Cross-sectional B-Spline Curves
...Show More Authors

This research presents a particular designing strategy for a free form of surfaces, constructed by the lofting design method. The regarded surfaces were created by sliding a B-spline curves (profile curves), in addition to describing an automatic procedure for selective identification of sampling points in reverse engineering applications using Coordinate Measurement Machine. Two models have been implemented from (Ureol material) to represent the different cases of B-spline types to clarify its scope of application. The interior data of the desired surfaces was designed by MATLAB software, which then were transformed to UG-NX9 software for connecting the sections that were designed in MATLAB program and obtaining G-code programs for the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Rutting Prediction of Asphalt Mixtures Containing Treated and Untreated Recycled Concrete Aggregate
...Show More Authors

Rutting is a crucial element of the mechanical performance characteristics of asphalt mixtures, which was the primary target of this study. The task involved substituting various portions of virgin coarse aggregate with recycled concrete aggregate materials that had been treated or left untreated at rates ranging from 25 to 100%, with a constant increase of 25%. The treatment process of recycled concrete aggregate involved soaking in acetic acid, followed by a mechanical process for a short time inside a Los Angeles machine without the balls. This research utilized two primary tests: the standard Marshall test to identify the optimal asphalt contents and the volumetric characteristics of asphalt mixtures. The other one w

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of Engineering
USING FUZZY LOGIC CONTROLLER FOR A TWO- TANK LEVEL CONTROL SYSTEM
...Show More Authors

This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.

Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
An Experimental Study of the Server-based Unfairness Solutions for the Cross-Protocol Scenario of Adaptive Streaming over HTTP/3 and HTTP/2
...Show More Authors

Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Ant Colony Optimization Algorithm for Design of Distribution System with Practical Application
...Show More Authors

The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods. 

The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 03 2020
Journal Name
Modern Sport
Exercises based on the phosphogenic energy system to develop the ability to perform with precision and accuracy
...Show More Authors

Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle

... Show More
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Mechanical Engineering
Improving the Performance of the Vehicle Suspension System Using Inerter
...Show More Authors

Preview PDF
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref