Preferred Language
Articles
/
alkej-547
Prediction of Process Parameters That Affecting on Surface Roughness in Multi-Point Forming Process Using ANOVA Algorithm
...Show More Authors

 

Multipoint forming process is an engineering concept which means that the working surface of the punch and die is produced as hemispherical ends of individual active elements (called pins), where each pin can be independently, vertically displaced using a geometrically reconfigurable die. Several different products can be made without changing tools saved precious production time. Also, the manufacturing of very expensive rigid dies is reduced, and a lot of expenses are saved. But the most important aspects of using such types of equipment are the flexibility of the tooling. This paper presents an experimental investigation of the effect of three main parameters which are blank holder, rubber thickness and forming speed that affect the surface integrity for brass (Cu Zn 65-35) with 0.71 mm thickness.

This paper focuses on the development of prediction models for estimation of the product quality. Using Analysis of Variance (ANOVA), surface roughness has been modeled. In the development of this predictive model, blank holder, rubber thickness and forming speed have been considered as model parameters. The mean surface roughness (Ra) is used as response parameter to predict the surface roughness of multipoint forming parts. The data required has been generated, compared and evaluated to the proposed models obtained from experiments.

Taguchi algorithm was used to predict the forming parameters (blank holder, rubber thickness and forming speed) on product roughness in forming process of Brass (Cu Zn 65-35) based on orthogonal array of L9 and finally ANOVA was used to find the optimum parameters that have effect on the product quality.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm for Improving the Quantity and Quality of the Detected Complexes from Protein Interaction Networks
...Show More Authors

One of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Merge Operation Effect On Image Compression Using Fractal Technique
...Show More Authors

Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.

View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Classifying Illegal Activities on Tor Network using Hybrid Technique
...Show More Authors

    With the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervise

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A Survey on Feature Selection Techniques using Evolutionary Algorithms
...Show More Authors

     Feature selection, a method of dimensionality reduction, is nothing but collecting a range of appropriate feature subsets from the total number of features. In this paper, a point by point explanation review about the feature selection in this segment preferred affairs and its appraisal techniques are discussed. I will initiate my conversation with a straightforward approach so that we consider taking care of features and preferred issues depending upon meta-heuristic strategy. These techniques help in obtaining the best highlight subsets. Thereafter, this paper discusses some system models that drive naturally from the environment are discussed and calculations are performed so that we can take care of the prefe

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Study of Some Hematological Parameters of Dogs Infected with Toxocariasis, before and after the Treatment with Tetramisole, in Al-Diwaniyah Governorate, Iraq
...Show More Authors

The presented investigation, here, was carried out to understand the status of the blood parameters, before and after deworming of Toxocara infection in dogs. For performing the study, 15 pet dogs were recruited from some residential areas in Al-Diwaniyah Province, Iraq. These dogs were exposed to fecal-microscopic based detection of Toxocara eggs and hematological based evaluation of white blood cell (WBC), red blood cell (RBC), and differential counts before and 10 days after treatment with tetramisole. The helminth eggs in the feces of dogs were detected by the flotation method. In case of egg detection, deworming was carried out with tetramisole. The results revealed that the egg number was significantly (p˂0.05) decreased

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Mar 14 2019
Journal Name
Al-khwarizmi Engineering Journal
Creeping Gait Analysis and Simulation of a Quadruped Robot
...Show More Authors

A quadruped (four-legged) robot locomotion has the potential ability for using in different applications such as walking over soft and rough terrains and to grantee the mobility and flexibility. In general, quadruped robots have three main periodic gaits:  creeping gait, running gait and galloping gait. The main problem of the quadruped robot during walking is the needing to be statically stable for slow gaits such as creeping gait. The statically stable walking as a condition depends on the stability margins that calculated particularly for this gait. In this paper, the creeping gait sequence analysis of each leg step during the swing and fixed phases has been carried out. The calculation of the minimum stability margins depends up

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Apr 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Structural and Surface Morphology Properties of Aluminum Doped CdO Thin Films Prepared by Vacuum Thermal Evaporation Technique.
...Show More Authors

   Undoped and Al-doped CdO thin films have been prepared by vacuum thermal evaporation  on  glass  substrate  at  room  temperature  for  various  Al  doping ratios (0.5, 1 and 2)wt.% . The films are characterized by XRD and AFM surface morphology properties. XRD analysis showed that CdO:Al films are highly polycrystalline and exhibit cubic crystal structure of lattice constant averaged to 0.4696 nm with (111) preferred orientation. However, intensity of all peaks rapidly decreases which indicates that the crystallinity decreases with the increase of Al dopant. The grain size decreases with Al content (from 60.81 to 48.03 nm). SEM and AFM were applied to study the morphology an

... Show More
View Publication Preview PDF