Preferred Language
Articles
/
alkej-345
ptimization the Parameters of Magnetic Abrasive Process Using Taguchi Method to Improve the Surface Roughness
...Show More Authors

Abstract  

Magnetic abrasive finishing (MAF) process is one of non-traditional or advanced finishing methods which is suitable for different materials and produces high quality level of surface finish where it uses magnetic force as a machining pressure. A set of experimental tests was planned according to Taguchi orthogonal array (OA) L27 (36) with three levels and six input parameters. Experimental estimation and optimization of input parameters for MAF process for stainless steel type 316 plate work piece, six input parameters including amplitude of tooth pole, and number of cycle between teeth, current, cutting speed, working gap, and finishing time, were performed by design of experiment (DOE) and response surface methodology (RSM).These six input parameters in this research were optimized  for all input parameters to improve the surface layer for work piece by using signal-to-noise ratio technique. The obtained results showed that all six input parameters have an influence on the change in surface roughness(∆Ra). In addition, the results showed that the surface roughness of the work piece decreased from 1.130 to 0.370µm that means high level of improvement in the change of surface roughness (0.760)µm.

Keywords: MAF process, MINITAB software, parameters, Signal-to-Noise ratio, surface roughness, Taguchi orthogonal array.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Sport Sciences
The effect of using the McCarthy model according to cognitive style (rigid- flexibility) in learning some skills in artistic gymnastics for women
...Show More Authors

The aim of the research is to identify the cognitive method (rigidity flexibility) of third-stage students in the collage of Physical Education and Sports Sciences at The University of Baghdad, as well as to recognize the impact of using the McCarthy model in learning some of skills in gymnastics, as well as to identify the best groups in learning skills, the experimental curriculum was used to design equal groups with pre test and post test and the research community was identified by third-stage students in academic year (2020-2021), the subject was randomly selected two divisions after which the measure of cognitive method was distributed to the sample, so the subject (32) students were distributed in four groups, and which the pre te

... Show More
Preview PDF
Publication Date
Mon Jan 11 2021
Journal Name
2nd International Conference In Physical Science & Advanced Materials
Comparing the optical parameters for thin CAZTSe films prepared with various Ag ratios and annealing temperatures
...Show More Authors

􀀑􀀃Pure Cu (CZTSe) and Ag dopant CZTSe (CAZTSe) thin films with Ag content of 0.1 and 0.2 were fabricated on coring glass substrate at R.T with thickness of 800nm by thermal evaporation method. Comparison between the optical characteristics of pure Cu and Ag alloying thin films was done by measuring and analyzing the absorbance and transmittance spectra in the range of (400-1100)nm. Also, the effect of annealing temperature at 373K and 473K on these characteristics was studied. The results indicated that all films had high absorbance and low transmittance in visible region, and the direct bang gap of films decreases with increasing Ag content and annealing temperature. Optical parameters like extinction coefficientrefractive index, and

... Show More
Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
A study of Land Zoning in the base of Traffic Noise Pollution Levels using ArcGIS: Kirkuk City as a Case Study
...Show More Authors

This study is an approach to assign the land area of  Kirkuk city [ a city located in the northern of Iraq, 236 kilometers north of  Baghdad  and 83 kilometers  south of  Erbil [ Climatic atlas of  Iraq, 1941-1970  ]  into different  multi zones by using Satellite image and Arc Map10.3,  zones of different traffic noise pollutions. Land zonings process like what achieved in this paper will help and of it’s of a high interest point for the future of Kirkuk city especially urban

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Apr 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Derivation of Mathematical Equations to Calculate the Geographical Coordinates of Unknown Position Situated at a Distance from the Observer Position Using GPS Data
...Show More Authors

     This research introduced the derivation of mathematical equations to calculate the Cartesian and geographical coordinates of a site situated at a far distance from the observer position by using GPS data. The geographical coordinates (Ï•obs., λ obs., hobs.) for observer position were transformed to Cartesian coordinates (X obs., Y obs., Z obs.) of observer position itself. Then the Cartesian coordinates of unknown position mathematically were calculated from these calculated equations, and its transformed to geographical coordinates of (Ï•unk., λunk.) position.
 

View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Using ARIMA models to forecast the volume of cargo handled in Iraqi ports An applied study in the general company of Iraqi ports
...Show More Authors

Time series is an important statistical method adopted in the analysis of phenomena, practices, and events in all areas during specific time periods and predict future values ​​contribute to give a rough estimate of the status of the study, so the study aimed to adopt the ARIMA models to forecast the volume of cargo handled and achieved in four ports (Umm Qasr Port, Khor Al Zubair Port, Abu Flus Port, and Maqal Port(, Monthly data on the volume of cargo handled for the years (2006-2018) were collected (156) observations. The study found that the most efficient model is ARIMA (1,1,1).

The volume of go

... Show More
View Publication Preview PDF
Crossref