Preferred Language
Articles
/
alkej-163
Drilling of FR-4 Composite Materials Using Single Pulse of Nd:YAG Laser
...Show More Authors

Laser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shape, laser peak power, and pulse duration. It was found that (-1) was the best fpp due to less taper for the drilled holes made by this level (Entrance hole =0.68, Exit hole = 0.27). To predict pulse shape effects; three types were : rectangular , rump-up and cool down, it were  examined found that rectangular pulse was efficient  more than the other types due to its ability to produce holes with less tapering as compared with others types. Also its found that all pulse shapes had the same effect on the materials microstructure . Laser peak power and pulse duration had the predominant affects on the hole dimensions and edge quality without any defect except hole tapering.  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Approximate Numerical Solutions for Linear Volterra Integral Equations Using Touchard Polynomials
...Show More Authors

In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Improving Reverse Engineering Processes by using Articulated Arm Coordinate Measuring Machine
...Show More Authors

The invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Numerical Solution for Linear State Space Systems using Haar Wavelets Method
...Show More Authors

In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 08 2026
Journal Name
Wasit Journal Of Sports Sciences
The effect of regulated competition style exercises in improving recovery and special endurance according to the pulse index of the youth national team boxers.
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
Abrasive Wear Characteristics of Composite Material (AA 7075 / SiC) Synthesized by Stir Casting
...Show More Authors

Aluminum Metal Matrix Composites (ALMMCs) was prepared by using stir casting technique for AA 7075 aluminum alloy as a matrix reinforced with SiC particles at various percentages (3, 6, 9 and 12 wt. % ) and 75µm in grain size. The prepared composite material can be used for many applications such as aerospace, automobiles and many industrial sectors. Abrasive wear test was carried out by two stages: the first stage was done by changing the emery papers at various grit sizes 180, 320, 500, and 1000µm with constant applied load 15N. While the second stage was carried out by changing the applied loads 5, 10, 15, 20 and 25N with constant emery paper at 320 µm grit size. Microstructure examination, hardness test and roughn

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The role of an active teacher in developing the curriculum by using educational techniqes a theoretical study
...Show More Authors

Preparing teacher occupies the attention of many thinkers and philosophers since the age of
kaldinics ( people of mesoptam / 2342 pH ) to the Islamic age where moslems philosophers
focus their attention on thought and philosophy where the philosophy of that teaching
depends on : teacher , student and family begin .
So , the issue of preparing and training teacher occupies the attention of education scientists
depending on his vital and important role in implementing of teaching policies in philosophies
and Islamic educational thought , therefore , the preparing and development of the teacher
regards as one of the basics of teaching development because of its importance in
development of teaching performance and th

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Economics And Administrative Sciences
Modeling Absolute Deviations Method by using Numerical Methods to measure the dispersion of the proposal for error
...Show More Authors

Is in this research review of the way minimum absolute deviations values ​​based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values ​​proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.

 

View Publication Preview PDF
Crossref