Preferred Language
Articles
/
alkej-735
The The Application of Virtual Reality to (Mechatronics Engineering) by Creating an Articulated Robotic Work Cell Using EON Reality V9.22.24.24477
...Show More Authors

Virtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope.  The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the third provides valuable guidance for industry and robotic based manufacturing, allowing a better view and simulating conditions otherwise inaccessible.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation Age and Gender for General Census of the population in Iraq by using nonparametric Bayesian Kernel Estimators
...Show More Authors

The process of evaluating data (age and the gender structure) is one of the important factors that help any country to draw plans and programs for the future. Discussed the errors in population data for the census of Iraqi population of 1997. targeted correct and revised to serve the purposes of planning. which will be smoothing the population databy using nonparametric regression estimator (Nadaraya-Watson estimator) This estimator depends on bandwidth (h) which can be calculate it by two ways of using Bayesian method, the first when observations distribution is Lognormal Kernel and the second is when observations distribution is Normal Kernel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Studying the Adsorption of Lead from aqueous Solution using Local Adsorbent Material Produced from Waste Tires by Pyrolysis
...Show More Authors

In this research a local adsorbent was prepared from waste tires using two-step pyrolysis method. In the carbonization process, nitrogen gas flow rate was 0.2L/min at carbonization temperature of 500ºC for 1h. The char products were then preceded to the activation process at 850°C under carbon dioxide (CO2) activation flow rate of 0.6L/min for 3h. The activation method produced local adsorbent material with a surface area and total pore volume as high as 118.59m2 /g and 0.1467cm3/g, respectively. The produced . local adsorbent (activated carbon) was used for adsorption of lead from aqueous solution. The continuous fixed bed column experiments were conducted. The adsorption capacity performance of prepared activated carbons in this work

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison of Parameters Estimation Methods for the Negative Binomial Regression Model under Multicollinearity Problem by Using Simulation
...Show More Authors

This study discussed a biased estimator of the Negative Binomial Regression model known as (Liu Estimator), This estimate was used to reduce variance and overcome the problem Multicollinearity between explanatory variables, Some estimates were used such as Ridge Regression and Maximum Likelihood Estimators, This research aims at the theoretical comparisons between the new estimator (Liu Estimator) and the estimators

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Oral Health And Preventive Dentistry
Antioxidant and Antineoplastic Activities of Hibiscus sabdariffa Linn. Petal Extracts against Oral Squamous Cell Carcinoma Cell Line
...Show More Authors

Purpose: To assess the antioxidant and antineoplastic effects of Hibiscus sabdariffa Linn. on oral squamous cell carcinoma cells. Materials and Methods: Human squamous cell carcinoma HSCC cells were tested for cytotoxicity by a methanol extract of Hibiscus sabdariffa (MEHSP). After 24, 48, and 72 ...

View Publication
Scopus (1)
Scopus
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jul 16 2019
Journal Name
Journal Of Legal Sciences
Compensation for civil liability arising from media damages
...Show More Authors

Freedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.

View Publication
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Numerical Research on Flow-Induced Vibration in Valves
...Show More Authors

Abstract  

All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
An Evaluative study for the Arabic language course program: An Evaluative study for the Arabic language course program
...Show More Authors

Abstract
Language is one of God’s blessings to human beings through which he
distingushed them from other creatures, then how if this language was arabic.
God honored this language and in which he descended his Gracious Boole
that gave it glory and magnificance, and made it an immortal revelation to the
arab nation in their poetry, oration, history and human tendency to the life of
knowledge, mind leadershipe, innovation and progress.
This study aimed at evaluating the arabic language come program for
the new teachers. The sample was of (25) participants who were shown a
questionaire consisting of (60) items distributed on (9) fields. Then, the data
was processed statisically by using preauency rate, Kai s

... Show More
View Publication Preview PDF