Preferred Language
Articles
/
alkej-508
Improvement of Surface Roughness Quality for Stainless Steel 420 Plate Using Magnetic Abrasive Finishing Method
...Show More Authors

     An experimental study was carried out to improve the surface roughness quality of the stainless steel 420 using magnetic abrasive finishing method (MAF). Four independent operation parameters were studied (working gap, coil current, feed rate, and table stroke), and their effects on the MAF process were introduced. A rotating coil electromagnet was designed and implemented to use with plane surfaces. The magnetic abrasive powder used was formed from 33%Fe and 67% Quartz of (250µm mesh size). The lubricant type SAE 20W was used as a binder for the powder contents. Taguchi method was used for designing the experiments and the optimal values of the selected parameters were found. An empirical equation representing the relation between surface roughness with operation parameters have been achieved.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Improve The Fully Convolutional Network Accuracy by Levelset and The Deep Prior Method
...Show More Authors

     Deep learning techniques allow us to achieve image segmentation with excellent accuracy and speed. However, challenges in several image classification areas, including medical imaging and materials science, are usually complicated as these complex models may have difficulty learning significant image features that would allow extension to newer datasets. In this study, an enhancing technique for object detection is proposed based on deep conventional neural networks by combining levelset and standard shape mask. First, a standard shape mask is created through the "probability" shape using the global transformation technique, then the image, the mask, and the probability map are used as the levelset input to apply the image segme

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 09 2018
Journal Name
Al-khwarizmi Engineering Journal
Creating Through Points in Linear Function with Parabolic Blends Path by Optimization Method
...Show More Authors

The linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation and Characterization of a Hierarchically Porous Zeolite-Carbon Composite from Economical Materials and Green Method
...Show More Authors

Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Application of “LIML_LVR” method practically according to the general formula K-CLASS on suggestion simultaneous equation
...Show More Authors

في هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Proposed Method of Air Traffic Routing in Dynamic Environment Usiing Modifed rrt With Collision Avoid Nace
...Show More Authors

     In the current Airlines Air Traffic Management (ATM), the Air Traffic Control Operators (ATCO), with the Air Traffic Control systems (ATC), operate air traffic paths with a small number of fixed routes. Problems of fixed routes appear such that even when they reduce the chance for conflict, they also produce flight paths plans that do not reduce flight time or fuel usage. In nowadays Airlines are heavily overloaded and anxious to minimize the aircrafts fuel usage costs, increase airplanes, and optimize the paths or the flight routes in order to find the most optimal suitable flight paths. This paper presents a new path planning method that deal with such problem effectively, the idea was to produce flights routes

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
A Deep Study on the Performance of the Spatial Density Distribution Method to Recognize Handwritten Signatures
...Show More Authors

    A signature is a special identifier that confirms a person's identity and distinguishes him or her from others. The main goal of this paper is to present a deep study of the spatial density distribution method and the effect of a mass-based segmentation algorithm on its performance while it is being used to recognize handwritten signatures in an offline mode. The methodology of the algorithm is based on dividing the image of the signature into tiles that reflect the shape and geometry of the signature, and then extracting five spatial features from each of these tiles. Features include the mass of each tile, the relative mean, and the relative standard deviation for the vertical and horizontal projections of that tile. In the clas

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Identification of Candida species Isolated From Vulvovaginal Candidiasis Patients by Chromgen agar and PCR-RFLP Method
...Show More Authors

This study focuses on diagnosis of Candida species causing Vulvovaginal Candidiasis using phenotype and genotype analyzing methods, and frequencies of candida species also using Vulvovaginal Candidiasis patients. 130 samples (100 from patients and 30 from non infected women) were collected and cultured on biological media. Identifying the yeasts, initially some phenotypic experiments were carried out such as germ tube, from motion of pseudohyphae and clamydospores in CMA+TW80 medium, API20 candida and CHROMagar Candida. Genomic DNA of all species were extracted and analyzed with PCR and subsequent Polymerase Chain Reaction - Restriction Fragments Length Polymorphism (PCR-RFLP) methods. Frequency of C. albicans, C. krusei, C. tropicalis , C.

... Show More
View Publication Preview PDF
Crossref