Preferred Language
Articles
/
alkej-87
Experimental and Simulation investigations of Micro Flexible Deep Drawing Using Floating Ring Technique
...Show More Authors

Micro metal forming has an application potential in different industrial fields. Flexible tool-assisted sheet metal forming at micro scale is among the forming techniques that have increasingly attracted wide attention of researchers. This forming process is a suitable technique for producing micro components because of its inexpensive process, high quality products and relatively high production rate. This study presents a novel micro deep drawing technique through using floating ring as an assistant die with flexible pad as a main die. The floating ring designed with specified geometry is located between the process workpiece and the rubber pad. The function of the floating ring in this work is to produce SS304 micro cups with profile radius precision as required as possible. The finite element simulations are accomplished using the commercial code Abaqus/Standard. In order to verify the simulation models, micro deep drawing experiments are carried out using a special set up developed specifically to meet the requirements of the simulations. The results revealed that the proposed technique is feasible to be adopted for producing micro cups with remarkable application capability in miniaturization technology.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 09 2021
Journal Name
Applied System Innovation
Design and Optimization of Vertical Axis Wind Turbines Using QBlade
...Show More Authors

Wind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di

... Show More
Scopus (23)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing agricultural role in initiative for agricultural development: Applied research in agriculture Muthanna Directorate
...Show More Authors

The study aims to indicate the role of the agricultural initiative in building agricultural development, mediated by activation of the role of internal and external audit on agricultural initiative projects, for the purpose of meeting the challenges of abuses on agricultural land and lack of water used in agriculture and proportions of high poverty, which led to the rural people of the migration to the city and leave agriculture and livestock, and that of the main conclusions reached by the researcher. When comparing the work of the external auditing agencies (the Federal Office of Financial Supervision) on the initiative of agricultural projects with internal audit services in the Directorate of Agriculture and branches of the Agricultu

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 13 2023
Journal Name
مجلة العلوم النفسية
واقع مشاركة رياديات الاعمال في تحقيق اهداف التنمية المستدامة دراسة ميدانية في محافظة بغداد
...Show More Authors

للمرأة دوراً استراتيجياً حيوياً في المجتمع ، بوصفها نصف المجتمع ، ونظراً لأهمية الأدوار التي تؤديها في مجالات الحياة كافه سواء الاجتماعية ، أو السياسية ، أو الاقتصادية ، في ظل التغيرات والتحولات التي شهدتها المجتمعات عامة والمجتمع العراقي تحديدا, لاسيما في الفترة الأخيرة كانتشار التعليم والصحة ومفاهيم العدالة وتكافؤ الفرص في مختلف الميادين ، والتي صاحبها وبشكل واضح زيادة مشاركة المرأة في مجالات العمل المخ

... Show More
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The extent of the social worker’s use of group discussion technique in professional practice with school activity groups in Tubas Governorate schools
...Show More Authors

This study aimed at identifying the extent to which the social worker used the techniques of group discussion in the professional practice with the groups of school activity in the schools of Tubas governorate in light of some variables (gender, years of experience, academic qualification). The analytical descriptive method was used due to its suitability for the objectives of the study.  A questionnaire was designed to collect data that included (30) items, distributed in three areas .The validity and reliability of the tool were verified and then distributed to the study sample.

 

The results of the study showed that the highest averages were in the discussion stage domain, where the pre-discussion stage was m

... Show More
View Publication Preview PDF