Preferred Language
Articles
/
alkej-418
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred between the proposed and original part so as to demonstrate the verification of the proposed method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 07 2017
Journal Name
المجلة العلمية للتربية البدنية وعلوم الرياضة. جامعة حلوان
تأثير استخدام تمرينات خاصة بالأثقال باسلوب التدريب (الدائري الهرمي) لتطوير مطاولة القوة المميزة بالسرعة و انجاز 200 متر للتجديف کاياک
...Show More Authors

Publication Date
Sat Jun 06 2015
Journal Name
مجلة
فعالية استخدام تدريبات القوة الدافعة الذاتية في تطوير القوة الخاصة و بعض القدرات الوظيفية و المهارية للاعبين الشبابا بالكرة الطائرة
...Show More Authors

Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
On the Use of the First-Person Pronoun ‘we’ in Final-Year Master Projects of South Algerian EFL Students
...Show More Authors

Literature on the use of the first-person pronoun in abstracts and conclusion sections of final-year projects is limited. In case of Algerian Master students, it is too scant. The present paper aims at filling this gap through a study concerned with students’ and engagement in their final projects (memoirs). This quantitative study examines the use of “we” and its various types, “our- us-I, my, the researcher” in memoirs chosen at random from the d-space portal of the University of Adrar, southern Algeria. Sixty-five papers, submitted in the fields of Linguistics or didactics between 2015 and 2020 and representing nearly half of the whole memoirs’ depository at the library’s d-space, constituted the corpus of study. The des

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Land use change in Baghdad City and assessment of the Jadriyah and Umm Al- Khanazeer Island Important Bird Area (IBA) from 1984 to 2020
...Show More Authors

Land use change, particularly the expansion of urban areas and associated human activities at the expense of natural and semi-natural areas, is a major ecological issue in urban areas around the world. Climate change being a very strong additional driver for changing the temperature and habitat in the cities. This also applies to Baghdad, Iraq, where urbanisation and climate change exerts a major pressure on the natural habitats of the city, and thus may affect the ability of city planners to adapt to future climate change scenarios. Here we present evidence of substantial growth in urban areas, increases in temperature, and degradation of natural vegetation within Baghdad city by using Remote Sensing techniques and an assessment for the

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use sensitivity analysis in evaluating projects Investment under the conditions of risk and uncertainty Case study of glass bottles project in Anbar province
...Show More Authors

This paper studies the investment project evaluation under the condition of uncertainty. Evaluation of investment project under risk and uncertainty is possible to be carried out through application of various methods and techniques. The best known methods are : Risk-adjusted discount rate , certainty equivalent method , Sensitivity analysis and Simulation method The objective of this study is using the sensitivity analysis in evaluation Glass Bottles project  in Anbar province under the condition of risk and uncertainty.

After applying sensitivity analysis we found that the glass bottles project  sensitive to the following factors (cash flow, the cost of investment, and the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
استخدام البرمجة الديناميكية في حل انموذج المعاينة الدورية الثابته لمشكلة الخزين مع تطبيق عملي في شركة الاقصى التجارية لاستيراد المولدات
...Show More Authors

The purpose of this paper is use the Dynamic Programming to solve a deterministic periodic review model for inventory problem and then to find the optimal policies that the company must uses in the purchase or production  (in the practical application example the Al Aksa company purchase the generators from out side country).

 

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Online 3D path planning for Tri-copter drone using GWO-IBA algorithm
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 18 2014
Journal Name
Journal Of Advances In Chemistry
Anastatica Hierochuntica L. Used As an Alternative of Conjugated Estrogen (Premarin) in Rabbit Females
...Show More Authors

Anastatica Hierochuntica L. Used As an Alternative of Conjugated Estrogen (Premarin) in Rabbit Females

Publication Date
Thu Jan 29 2026
Journal Name
Webology
Is the Stealth Marketing an Element of Promotion Mix? A Review of the Techniques
...Show More Authors

Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the

... Show More
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref