Preferred Language
Articles
/
alkej-694
Optimization the Effect of Electrode Material Change on EDM Process Performance Using Taguchi Method
...Show More Authors

Electrical Discharge Machining (EDM) is a widespread Nontraditional Machining (NTM) processes for manufacturing of a complicated geometry or very hard metals parts that are difficult to machine by traditional machining operations. Electrical discharge machining is a material removal (MR) process characterized by using electrical discharge erosion. This paper discusses the optimal parameters of EDM on high-speed steel (HSS) AISI M2 as a workpiece using copper and brass as an electrode. The input parameters used for experimental work are current (10, 24 and 42 A), pulse on time (100, 150 and 200 µs), and pulse off time (4, 12 and 25 µs) that have effect on the material removal rate (MRR), electrode wear rate (EWR) and wear ratio (WR). A Minitab software environment was used to adopt Taguchi method to analyze the effect of input on output parameters of EDM. The results of the present work showed that the best of MRR in copper and brass electrodes with (current 42 A, pulse on time 100 µs and pulse off time 25 µs) are (84.355×10-3 g/min) and (43.243×10-3 g/min) respectively, and the MRR predicted by Taguchi are (86.1751×10-3 g/min) in copper electrode by using the parameters with (current 10 A, pulse on time 200 µs and pulse off time 25 µs) and (43.2979×10-3 g/min) in brass electrode at current 42 A, pulse on time 100 µs, and pulse off time 25 µs. The lowest EWR occurs with a value of (1.4510×10-3 g/min) with (current 10 A, pulse on time 100 µs, pulse off time 4 µs) variables when using a copper electrode. The highest WR (2.602508) was found for the brass electrode with (current 24 A, pulse on time 200 µs, pulse off time 4 µs) variables.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Genetic Polymorphism in the Mitochondrial DNA of the Mediterranean Fruit Fly Ceratitis Capitata (Wiedemann, 1824) (Diptera:Tephritidae)Using the Method of PCR-RFLP in Three Governorates in the Middle Region of Iraq.
...Show More Authors

Genetic polymorphism in a fragment of NADH (ND4),400bp long from the Mitochondrial DNA
(mtDNA) of Mediterranean fruit fly ceratitis capitata (Wiedemann, 1824) using PCR-RFLP method
with the restriction enzyme EcoRV in samples collected from three governorates in the middle of Iraq.
The purposes of this study is to establish database, discover the introduction source as well as studying
the genetic diversity for this economic pest in Iraq. The results show that there is a genetic
polymorphism of the studied gene fragment among Kut governorate as compaired with the other
studied samples according to digestion results of the restriction enzyme EcoRV.

View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Physics: Conference Series
Study of The Effect of Concentration on The Efficiency of The Sensitive N749-TiO2 Solar Cell
...Show More Authors

In this research, we studied the effect of concentration carriers on the efficiency of the N749-TiO2 heterogeneous solar cell based on quantum electron transfer theory using a donor-acceptor scenario. The photoelectric properties of the N749-TiO2 interfaces in dye sensitized solar cells DSSCs are calculated using the J-V curves. For the 〖(CH_3)〗_3 COH solvent, the N749-TiO2 heterogeneous solar cell shows that the concentration carrier together with the strength coupling are the main factors affecting the current density, fill factor and efficiency. The current density and current increase as the concentration increases and the strength coupling increases as the N749-TiO2 heterogeneous in solar cell. However, the efficiency is more sens

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Research Journal Of Pharmacy And Technology
Effect both of Kinetin and NPKZn Fertilizer on Mitigating The Adverse effect of Sodium Chloride on sweet pepper plant <i>Capsicum annuum</i> L.
...Show More Authors

The experiment was carried out in the green house of botanical garden belong to Department of Biology/College of Education for Pure Science- Ibn–al- Haitham/University of Baghdad, for the growth season 2015 using plastic pots. The experiment aimed to study the effect of two concentrations of sodium chloride (50, 100) mM.L-1 in addition to the control and four concentrations of kinetin (25, 50, 75, 100) mg.L-1 in addition to the control and the influence of application and non application of fertilizlizer NPKZn in the level 160 kg.h1- and their interactions on some growth parameters (fresh weight for both root and vegetative part, dry weight for leaves , value of secondary productivity, biomass duration for vegetative part and dry weight f

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Effect of Testosterone Enanthate Modeling of Polycystic Ovary on Liver Irs-2 mRNA Expression in Rats: A Brief Report
...Show More Authors

There are many animal models for polycystic ovary (PCO); using exogenous testosterone enanthate is one of the methods of induction of these models. However, induction of insulin resistance should also be studied in the modeling technics. Therefore, the present study aims to investigate the expression of insulin receptor substrate (Irs)-2 mRNA in the liver tissue of rat PCO model. Nineteen Wistar rats were divided into three groups; (1) PCO modeling group (N =7) received daily 1.0 mg/100g testosterone enanthate solved in olive oil along with free access dextrose water 5%, (2) vehicle group (N =6), which handled like the PCO group, but did not receive testosterone enanthate, (3) control group (N =6) with standard care. Al

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 12 2011
Journal Name
Journal Of Liquid Chromatography &amp; Related Technologies
RAPID DETERMINATION OF SPHINGANINE AND SPHINGOSINE IN URINE BY HIGH PERFORMANCE LIQUID CHROMATOGRAPHY USING MONOLITHIC COLUMN
...Show More Authors

A rapid high performance liquid chromatography method for the determination of sphinganine (Sa) and sphingosine (So) in urine samples by employing a silica-based monolithic column is described. The samples were first extracted using ethyl acetate and derivatized using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol. C20 sphinganine was used as internal standard. Under the optimized conditions, separation was achieved using a mixture of methanol:water (93:7, v/v), column temperature at 30°C, flow rate of 1 mL min−1, and an injection volume of 10 μL. Good linearity was obtained for Sa and So over the concentration range 20–500 ng mL−1(correlation coefficients ≥0.9978). The detection limits were 0.45 ng mL−1 for Sa and

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The importance of localizing salaries and its impact on the competitive advantage of the banking sector
...Show More Authors

Abstract:

           The aim of the research is to demonstrate the impact of the salary localization service in enhancing banking competitive advantage. In order to achieve this goal, salary localization was chosen as an independent variable and its impact was studied on the dependent variable, which is the competitive advantage. The research problem lies in the fluctuation of the salary localization service from one bank to another and the impact of this on the competitive advantage.  The study sample included five private Iraqi banks, namely (the National Bank of Iraq, the International Development Bank, Assyria International Bank, Al Khaleej Commercial Ban

... Show More
View Publication Preview PDF