Preferred Language
Articles
/
ijl-351
PDF Angular Laser Cleaning of Aluminum Al-4004 with Different Spot Sizes
...Show More Authors

Abstract: When it comes to applications in welding, cutting, and surface engineering, the utilization of high-power fiber-delivered beams from solid-state lasers offers several benefits. This paper addresses the issue of cleaning the surface of the samples with different spot sizes (50, 100 and 200) (industrial ytterbium fiber laser) to prepared it to be welded. Angular laser cleaning with incident angles (5, 10, 15, 20, 25, 30) ° with different powers (3, 5, 7, 10) W and hatch distance 0.001 was use for implemented.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 Sheikh Imam Al-Alai women
...Show More Authors

The research aims to introduce the elders of Imam Al-Ala who died in the year 761 AH. The study showed the prominent role of women in the eighth century AH in the sciences in general and in the hadith in particular. The woman did not depart from the call of divine education in the Almighty saying: Read in the name of your Lord who created * created mankind * created mankind * And your Lord, the Most Generous, who taught with the pen * taught man unless he knows the captive of verses 1-5.
        Families in that era had a prominent role in this concern, especially parents. They were attending boys and girls since their childhood, the lessons of scholars, and the benefit of science, and they were

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
A Comparison Between Recursive Least-Squares (RLS) and Extended Recursive Least-Squares (E-RLS) for Tracking Multiple Fast Time Variation Rayleigh Fading Channel
...Show More Authors

In order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Training of Skilled Force with The Different Medical Ball and Their Effect on Developing Some Special Physical Abilities and the Accuracy of Long Shooting Performance in Handball
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Full Text Book Of Minar Congress8
SECTION OF VETERINARY MEDICINE: MICROBIOLOGY, IMMUNITY AND VIROLOGY. THE BACTERIAL CONTAMINATION WITH PROTEUS AND E. COLI IN CERVIX AND UTERINE OF COWS DURING THE DIFFERENT ESTRUS PHASES
...Show More Authors

The herein research was carried out in order to identified the presence of bacteria in cervix and uterine lumen in Iraqi cattle during the different estrus phase with focusing on Protus and E coli. Estrus phases were determined by the structures which found on ovary (follicular growth for pro-estrus, mature growing follicle for estrus, hemorrhagic corpus luteam for meta-estrus and active corpus luteam for di-eatrus). Forty cervical swabs (ten for each estrus phase) and forty uterine swabs (ten for each estrus phase) were taken from macroscopically healthy reproductive animals after slaughtering and cultivated on nutrient agar and blood agar, the bacterial isolation were identified with biochemical teats. The present study found that

... Show More
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Visions in the poetry of Yahiya Ibn Hakam AL- Chazali: Visions in the poetry of Yahiya Ibn Hakam AL- Chazali
...Show More Authors

Conclusion and results
1. The research concluded through considering the rhetorical visions,
appropriate relationships between utterances with a language derived
from the reality of the social, religious, and, cultural life.
2. The poet compound between realism and the documentation of the
poetic structure, its depth, and the conjugation of its symbolic
metaphors, and also between its phonetic music and the right artistic
nature and the inanimate rules to take in consideration what Dr. Ahmad
Haikal concluded that the tried to com up with something better than
that of the previous generation, but he is still following their orbit, and
their trend method of poem building.
3. The realistic images visionary r

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Defining the Feature of Cold Wave (Al-Marba'aniyah) in Iraq: Defining the Feature of Cold Wave (Al-Marba'aniyah) in Iraq
...Show More Authors

Abstract:
Al-Marba'aniyah, which is a long cold wave, was defined by ancient
Iraqis. It represents the coldest days in Iraq. In this research paper, a new
scale was put to define it. It shows that the period between the minimum
temperature degree recoded in December and the minimum temperature
degree recorded in January is considered to be the period of Al-Marba'aniyah.
The research concluded that Al-Marba'aniyah is unsteady and it changes in
the days of its occurrence. It was also concluded that the dates of the
beginning and the end of Al-Marba'aniyah are unsteady, too. Moreover, it was
found out that each of the Siberian high, European high, and finally the
subtropical high are the responsible systems for

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The women at Al-Sakhaawi Book "A;-Dhau Al-Lami", Study in the social life
...Show More Authors

In our previous research , we study the method of women by ( al – sakhaawi " died 902
ah/1496a.c"book witch called ( al- dhau, al-lami) .
So in this paper , we will discuss the social life of women in the mamluk period through the
same book ,especially when the sakhaawi devoted a full part for women in the same book
called it (mhagam ,al –nessa)wich it translations a large number of women like wives
,daughters ,sisters ,and maids of mamluk sultans ,so that make my able to know a lot about
the social life of woman which we study it like a social aspects of women, here wealth,
business, professions ,and in the last we study the habits of them marriage .

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Information Using different lighting Color images
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More