Preferred Language
Articles
/
alkej-117
Construction and Evaluation of a Uniaxial Mechanical Actuated Vibration Shaker
...Show More Authors

In the present paper a low cost mechanical vibration shaker of rotating unbalanced type with uniaxial shaking table was designed and constructed in an attempt to provide opportunities for experimental testing and application of vibration in experimental modal analysis, stress relief of weldments, effect of vibration on heat transfer and seismic testing of civil engineering structures. Also, it provides unexpressive solution to enhance the knowledge and technical skills of students in mechanical vibration laboratory. The shaker consists of a five main parts shaker frame, shaker table, flexible support, drive motor, and eccentricity mechanism. The experimental results show that the amplitude of the shaker is increased with increasing the frequency ratio and the maximum value was attained near the resonance condition.  Also, the magnitude of amplitude is increased with increasing the eccentric mass and eccentricity values. A reasonable agreement with theoretical results shows that the shaker can be used with reliable results in vibration testing purposes. Also, in this paper, the frequency ranges of the shaker were determined for constant displacement and for constant acceleration tests to satisfy all the frequency limitation requirements of the mechanical shaker.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
A consensus on measurement
...Show More Authors

Many letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus

Building a blind measuring guide.
 We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 18 2022
Journal Name
World Bulletin Of Public Health (wbph)
WASTEWATER TREATMENTS: A REVIEW
...Show More Authors

Many water supplies are now contaminated by anthropogenic sources such as domestic and agricultural waste, as well as manufacturing activities, the public's concern about the environmental effects of wastewater contamination has grown. Several traditional wastewater treatment methods, such as chemical coagulation, adsorption, and activated sludge, have been used to eliminate pollution; however, there are several drawbacks, most notably high operating costs, because of its low operating and repair costs, the usage of aerobic waste water treatment as a reductive medium is gaining popularity. Furthermore, it is simple to produce and has a high efficacy and potential to degrade pollu

... Show More
Publication Date
Thu Sep 15 2022
Journal Name
Al-adab Journal
Towards a Humanitarian Race
...Show More Authors

View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
A ruling Zakat ornaments
...Show More Authors

The research topics important topic of jurisprudence worship, a ruling Zakat ornaments
prepared for use, and touched the odds scholars in it. Stroll scholars say that there is no Zakat
on ornaments prepared for use have reported their evidence they and the owners say the other
of those who say should be directed to pay zakaat, and discuss those views and statement
Dafeeha of Sahihaa, and came up with a summary then, showed where the prevailing view
that I see in agreement of the transferee and reasonable. Ask Him to show us the right, and
thank God.

View Publication Preview PDF
Publication Date
Thu May 05 2022
Journal Name
Al-kindy College Medical Journal
Planning a Medical Lecture
...Show More Authors

The aims of the lecture should be clearly defmed. These will help to define the teaching methods and the structure. If, for example, the purpose of the lecture is to introduce new knowledge and concepts, then a classic lecture structure might be most appropriate. On the other hand, if the purpose is to make the students aware of different approaches to a particular clinical problem, a problem oriented design in which alternative approaches are presented and discussed might be a more appropriate fonnat.
Lectures are still a common teaching methOd in both undergraduate and postgraduak medical education. Properly done, the lectwe is a creative and personal work by the teachll:l modeled upon his intellectual scaffolding. Few other fonns o

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 22 2025
Journal Name
International Journal Of Technology
Numerical Investigations of SiO2 and TiO2 Nanoparticle's Addition Impact on Performance, Combustion Features, and Emission Characteristics of a Diesel Engine Operating with Water Diesel Emulsified Fuel at Different Lambda Values and Engine Speeds
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of The Indian Chemical Society
Inspection the impact of mixing and external resistance on the Microbial Desalination Cell for electricity generation and desalination efficiency by using Macroalgae as a bio-cathode
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref