In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred between the proposed and original part so as to demonstrate the verification of the proposed method.
Background: Accurate and rapid assessment of allograft function is essential. Cystatin C has recently been proposed as an alternative marker of glomerular filtration rate (GFR). Its diagnostic value for the longitudinal assessment of graft function has not been addressed well.
Objective: To study the validity of cystatin C as an early marker and predictor of acute transplant rejection in the first week post transplantation.
Subjects and Methods: Sixty six renal transplants recipients recruited. The study conducted in four renal transplantation centers in Baghdad for the period from September to December 2011. Serum creatinine and cystatin C concentrations measured 48 hours before transplantation and day 3 a
The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreIn this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.
In this work the poly vinyl imides were prepared as thermal l y stable polymers by modified PVC and PVC copolymers \'lith different cyclic imides such as naphtha imide, phtbal imide, male imide and succin imide as a pendant groups.
This method gave new polyimides, from considered especially plastic because of their outstanding high performance properties. As
such, they are priced well above commodity polymers such as PVC
and PVC copolymers.
All the prepared polymers were characterized by IR, UV spectroscopy, elemental analysis and chemical reactions, and thermal analysis such as DTA and TG. Physical properties and the viscosities for all prepared polyimides were determined by using DMF as a sol
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreIn this paper, we suggest a descent modification of the conjugate gradient method which converges globally provided that the exact minimization condition is satisfied. Preliminary numerical experiments on some benchmark problems show that the method is efficient and promising.
Abstract:
The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year . The research examines the use of
... Show MoreThe Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from
... Show MoreConcurrent Engineering approved that it is distinguished technology efficiency as it reflect its affection on international great companies . Its becomes vital field connected with its ability to develop the products directly, as well as, its concentration on all local and international competition which need to research and expanded
This study deals with (concurrent engineering) subject in
(Dyala State Company for Electrical Industry) , to bring the benefits of this technology to develop 
Began the process of re-engineering processes in the private sector as a way to assist organizations in re-thinking how to run the business in order to improve production processes and reduce operational cost, to get to compete on a global level. That was a major restructuring by further evolution in the use of technology to support innovative operations.
Entered the technology in all areas of life and different regulations, This led to use as a change in all aspects The companies achieved success and progress today through the use of resources so as to ensure the wishes of the customers and their needs, and the requirements of the market primarily, Which is reflected on the basis of building strate
... Show More