Preferred Language
Articles
/
ijp-1133
Influence of NiTi Spring Dimensions and Temperature on the Actuator Properties
...Show More Authors

Nitinol (NiTi) is used in many medical applications, including hard tissue replacements, because of its suitable characteristics, including a close elastic modulus to that of bones. Due to the great importance of the mechanical properties of this material in tissue replacements, this work aims to study the hysteresis response in an attempt to explore the ability of the material to remember its previous mechanical state in addition to its ability to withstand stress and to obtain the optimal dimensions and specifications for the manufacturer of NiTi actuators. Stress-strain examination is done in a computational way using a mutable Lagoudas MATLAB code for various coil radii, environment temperatures, and coil lengths. The computational methodology was done by varying the dimensions and the ambient temperature of the simulated NiTi spring actuator. The hysteresis loop is studied by increasing the external stress for a reversible martensitic transformation. The coil radius, spring height, and wire radius affect the spring force and deformations. In the same way, these parameters affect the strain and stress point values. These changes are shown through the martensite and austenite start and finish values. The NiTi hysteresis loop narrows with increasing ambient temperature or initial spring height. At a higher temperature, the force supplied to the actuator must be less for the same deformation; therefore, a higher ambient temperature provides more efficiency for the shape memory devices and a longer lifetime for the actuator.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Effect of Some Herbs on the Level of Some Biochemical Parameters in Blood of Diabetic Patients Type II
...Show More Authors

This study included effect of polyherbs mixture treatment of diabetic patients type II for two months. The polyherbs mixture contains Nigella sativa seeds, Boswellia carterri gum, Citrus aurantifolia fruits, Elettaria cardamomum fruits. Also this study included estimation of some biochemical parameters in the serum Diabetes Mellitus (D.M.) patients-type II and knowing the relationship of these parameters with this disease. The parameters are glucose, cholesterol ,High density , Low density lipoproteins( HDL-C, LDL-C) respectively , Triglycerides TG, urea, total protein , albumin , Alkaline phosphatase ALP,Transaminase GOT, GPT enzymes . Take (77) samples of diabetic patients serum type II which included (47) samples for group one: herbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
An empirical Evaluation of the effect of service encounter on customer voluntary behavior: Exploration study of (TBI) customers
...Show More Authors

Purpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.

  • Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
  • Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Ebusiness And Egovernment Studies
THE ROLE OF ENTREPRENEURIAL ORIENTATION IN ACHIEVING STRATEGIC ENTREPRENEURSHIP WITH THE MEDIATING OF ORGANIZATIONAL AGILITY: AN ANALYTICAL STUDY ON SOME COMPANIES AFFILIATED TO THE IRAQI MINISTRY OF AGRICULTURE
...Show More Authors

Recently, there has been a notable surge in interest surrounding entrepreneurial orientation and strategic entrepreneurship. These concepts are particularly relevant due to their modern characteristics that aid in adapting to the environment. They also play a crucial role in improving production, service, and technological processes to sustain value, minimize competition, and drive ongoing enhancements, ultimately leading to a position of leadership within public companies. Therefore, the primary focus of this research was to examine the influence of entrepreneurial orientation on achieving strategic entrepreneurship. This influence is further mediated by the presence Iraqi Ministry of Agric

... Show More
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of TNF-Alpha Gene Polymorphisms At -376 G/A, -806 C/T, and -1031 T/C on The Likelihood of Becoming a Non-Responder to Etanercept in A Sample of Iraqi Rheumatoid Arthritis Patients
...Show More Authors

Tumor necrosis factor-alpha (TNF-α) antagonists’ therapy are expensive and has a non-responsive rate between 30% to 40% in rheumatoid arthritis patients. Genetic variation plays a vital role in the responsiveness to this type of therapy.The aim of this study is to investigate if the presence of genetic polymorphism in the TNF-α gene promoter region at locations -376 G/A (rs1800750), -806 C/T (rs4248158), and -1031 T/C (rs1799964) affects rheumatoid arthritis patient's tendency to be a non-responder to etanercept.

Eighty RA patients on etanercept (ETN) for at least six months were recruited from the Rheumatology Unit at Baghdad Teaching Hospital. Based on The European League Against Rheumatism response (EULAR) criteria, patient

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (15)
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref