Preferred Language
Articles
/
alkej-545
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.                                                                                                     

      A three dimensional (3-D) model has been constructed to study the temperature distribution and the depth or penetration of the weld spot. The results showed that the weld zone and heat affected zone (HAZ) suffer from high temperature variation caused by severe thermal cycle. The temperature reaches the highest value of the melt metal at the weld spot 698°C at weld current 130 Amp, weld time 6 sec and arc length 1.6 mm, then drops further away from the weld spot in the direction  the base metal.

      Figuers were plotted to explain the results and to show the temperature distribution and its value in the weld spot  and heat effected zone.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Suggested method for modifying the site parameter
...Show More Authors

     Estimating multivariate location and scatter with both affine equivariance and positive break down has always been difficult. Awell-known estimator which satisfies both properties is the Minimum volume Ellipsoid Estimator (MVE) Computing the exact (MVE) is often not feasible, so one usually resorts to an approximate Algorithm. In the regression setup, algorithm for positive-break down estimators like Least Median of squares typically recomputed the intercept at each step, to improve the result. This approach is called intercept adjustment. In this paper we show that a similar technique, called location adjustment, Can be applied to the (MVE). For this purpose we use the Minimum Volume Ball (MVB). In order

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Reduced Complexity SLM Method for PAPR Reduction
...Show More Authors

In this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.  

 

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
Contemporary Islamic Ideology Crisis According to Al- Sayid Muhammad Baqir Al- Sadr
...Show More Authors

 

The most prominant goal aimed at by contemporary islamic ideology is to present Islam to the whole world as a message of God that establishes for man a supreme civilization to accomplish justice, peace, development and prosperity

This mission is hindered by many obstacles that create Islamic ideology crisis such as loss of Comprehensive unifying vision which led to the loss of correct vision. This resulted in a Weakness of Priority arrangement and national interests a accomplishment.

There is also a problem of the curriculum that teaches Islamic ideology .

Another problem is that of the concept taken from Islamic culture.

Also another Problem Is the lack of understanding of

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Prepare a plan for the Total Productive Maintenance in the light of the concurrent engineering A Field Study in AL-Askandria General Company Machanical Industries and AL-Musaib Electric Power Station
...Show More Authors

           Strives Total Productive Maintenance  to increase the overall effectiveness of the equipment through the early involvement in the design and manufacture of equipment productivity. It also operates in an environment of simultaneous engineering work on the synchronization of activities to take advantage of early information by maintenance engineers, design, operation, and that helps to reduce the faults and facilitate future maintenance tasks.

    Has adopted a search in the theoretical concept of the total maintenance productivity and concurrent engineering activities carried out during which the conjunction a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The saying of Al-Azhar in the fatwas with it from the words of Imam Zafar (may God have mercy on him) by Imam Pirizadeh Al-Hanafi (d. 1099 AH)
...Show More Authors

It is no secret to anyone that studying and investigating books of jurisprudence, despite their suffering, is a pleasure that cannot be compared to pleasure, and it has benefits and importance that cannot be limited and summed up, and it has great fruits that researchers and students of knowledge reap, as well as enriching libraries with jurisprudential material, after dusting them and taking them out to the light of libraries to be seen. Researchers and scholars, generation after generation, so that this nation can benefit from this pioneering intellectual and scientific product that was written for us by our first ancestors of working scholars who enriched human civilization with this scientific material, which has become a beacon guid

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
The Degree of Using Augmented Reality Technology among students of the Optimum Invesment Project fot Teaching Personnel Program and the difficulties they face at Al-Shaqra University
...Show More Authors

Augmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese

... Show More
View Publication Preview PDF
Crossref