Fatigue failure is almost considered as the predominant problem affecting automotive parts under dynamic loading condition. Thus, more understanding of crack behavior during fatigue can strongly help in finding the proper mechanism to avoid the final fracture and extent the service life of components. The main goal of this paper is to study the fracture behavior of low carbon steel which is used mostly in automotive industry. For this purpose, the fractography of samples subjected to high and low stress levels in fatigue test then was evaluated and analyzed. Hardness and tensile tests were carried out to determine the properties of used steel. Also, the samples were characterized by microstructure test and XRD analysis to examine the con
... Show MoreThe experiment aimed to Manufacture a device for checking the nozzles and testing its efficiency and to study the effect of research factors on the studied traits. The device was manufactured locally through using materials available in the Iraqi market. The system is Both Hydraulic and electronic (ISO 5682-1)1 relay on sensors technology and the test platform was built and designed on a movable trolly at the department of Agricultural Machines and Equipment / College of Agricultural Science / University of Baghdad. The design includes the use of mechanical water pump and electrical AC water pump. The design includes a nozzle holder that can accommodate three nozzles per test. The design also consists of spreading wings and stationa
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show MoreIn this work, the effect of different particle size on the nonlinear optical properties of silver nanoparticles in de-ionized water was studied. The experimental observation of the far field diffraction patterns by CCD camera in two and three dimensions. The maximum change of nonlinear refractive index and the relative phase shift were calculated. The self-defocusing technique was used with a continuous-wave radiation from DPSS Blue laser .The wavelength is 473 nm with an output power of 270 mW. All the Ag colloids samples containing the sizes 15, 30, 50, and 70 nm of silver nanoparticles used in the study were chemically prepared. It was found that the nonlinear refractive index is a particle size dependent and of the order of 10-7 cm2/
... Show MoreIs the subject of environmental analysis of the important issues that should occupy the attention of the departments of banks in general and banks in particular, the research sample, regardless of their size and the nature of its activity, So if the current era and witnessing rapid developments and changes, making the banking environment is more complex and interconnected than ever, And it became not possible for banks to be aware and understand the external environment variables without an analysis of the various constituent elements and influential heavily in its financial and administrative,Therefore research aims to find out the relationship between the external environment and banking facilities analysis application on the Rafidain
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis research highlights the light on the general framework of accounting discloser in the Islamic banks, and show the types and the concepts of Cost Efficiency, In this present study, the sample included Fourteen Islamic banks, where the data was collected from the annual financial reports. Accordingly, the study in order to achieve the aims and access to the results based on the analytical method and the descriptive analysis, and conducted a Simple & Multiple Linear Regression analysis, in order to test hypotheses of the research by using of statistical analysis software (SPSS). The research has arrived to many results such as: the commitment of Islamic banks working in the Kingdome of Bahrain (Wholesale) to the requirements of the
... Show MoreThe research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP