Preferred Language
Articles
/
ijp-1142
Fatigue and Tensile Characteristics for Composite Materials Used in Prosthetic Socket
...Show More Authors

In this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic modulus of 4.021 GPa, while for the G group, these values are 12.75 MPa, 18.84 MPa, and 4.076 GPa, respectively. The fatigue test was used to evaluate the failure characteristics of the socket. An F-socket was utilized to test the interface compression between both the limb and the socket. For the Tekscan sensor, the calculated pressure in the medial region is 350 K Pa, while it is 330 KPa in the posterior region. Solid Works software was used to draw a prosthetic socket for the numerical study. The failure safety agent for the composite material for group Y was 1.26. The finite element method (ANSYS Workbench 14.5) was used to look at the fatigue characteristics to detect the maximum stress, safety factor, and total deformation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Fri Feb 13 2026
Journal Name
Tikrit University Journal For Rights
Legal provisions for concluding contracts through public auctions
...Show More Authors

View Publication
Publication Date
Thu Sep 26 2019
Journal Name
Processes
Fine-Tuning Meta-Heuristic Algorithm for Global Optimization
...Show More Authors

This paper proposes a novel meta-heuristic optimization algorithm called the fine-tuning meta-heuristic algorithm (FTMA) for solving global optimization problems. In this algorithm, the solutions are fine-tuned using the fundamental steps in meta-heuristic optimization, namely, exploration, exploitation, and randomization, in such a way that if one step improves the solution, then it is unnecessary to execute the remaining steps. The performance of the proposed FTMA has been compared with that of five other optimization algorithms over ten benchmark test functions. Nine of them are well-known and already exist in the literature, while the tenth one is proposed by the authors and introduced in this article. One test trial was shown t

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Hydrology
Complementary data-intelligence model for river flow simulation
...Show More Authors

View Publication
Crossref (88)
Crossref
Publication Date
Thu Jun 16 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Optimization algorithms for transportation problems with stochastic demand
...Show More Authors

The purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Sun Jun 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of Surface Diffusion Coefficient for Adsorption Process
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Chalcogenide Letters
Copper telluride thin films for gas sensing applications
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of The Association Of Arab Universities For Basic And Applied Sciences
Semi-analytical method for solving Fokker-Planck’s equations
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
2011 Developments In E-systems Engineering
Enhanced Computation Time for Fast Block Matching Algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref