Preferred Language
Articles
/
ijp-26
Nanosecond laser pulses for aluminum and copper drilling
...Show More Authors

Nd:YAG laser pulses of 9 nanosecond pulse duration and operating wavelength at 1.06 μm, were utilized to drill high thermal conductivity and high reflectivity aluminum and copper foils. The results showed a dependence of drilled holes characteristics on laser power density and the number of laser pulses used. Drilled depth of 74 ϻm was obtained in aluminum at 11.036×108 W/cm2 of laser power density. Due to its higher melting point, copper required higher laser power density and/or larger number of laser pulses to melt, and a maximum depth of 25 μm was reached at 13.46×108 W/cm2 using single laser pulse.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Case Studies In Construction Materials
Appraising the synergistic use of recycled asphalt pavement and recycled concrete aggregate for the production of sustainable asphalt concrete
...Show More Authors

Material obtained from the demolition of concrete structures and milling of flexible pavements has the highest potential for recyclability. This study aimed to evaluate the performance of hot mix asphalt with the concurrent use of recycled asphalt pavement (RAP) and recycled concrete aggregate (RCA). Contents of RAP and RCA were varied from 0% to 50% by fixing the total recycling materials percentage to 50%. Penetration grade 40/50 virgin binder and waste engine oil (WEO) as rejuvenator were used in the present study. A series of tests, such as Scanning electron microscopy (SEM), Marshall stability, indirect tensile strength test, IDEAL CT, uniaxial compression test, and resilient modulus test, were carried out to assess the performance of

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Nov 21 2018
Journal Name
International Journal Of Control, Automation And Systems
Design and Stability Analysis of a Fractional Order State Feedback Controller for Trajectory Tracking of a Differential Drive Robot
...Show More Authors

View Publication
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sat Mar 20 2021
Journal Name
Psychology And Education
Analyzing the Mutual Impact between Accounting Profit and Stock returns for Joint Stock Companies Registered in Baghdad Stock Exchange
...Show More Authors

The research aims to test the two characteristics of the relationship between accounting profits and the stock returns, to find out the suitability of both of them in explaining the relationship between accounting profits and stock returns for joint stock companies registered in the Baghdad Stock Exchange, also aims to reaching the most appropriate specification for the relationship between the two variables of the company’s stock dealing in the Baghdad Stock Exchange, and get a set of results, the most important of which are: the ability of changing for both of these variables in the profits share and the stock level of the profits does not explain more than 9,9% of the market returns of the Iraqi Joint Stock Companies registered i

... Show More
View Publication
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Addiction of electronic games for children
...Show More Authors

Childhood is characterized by ahigh privacy in the life of the child overall educational institutions in the world. Based on this specificity, modern education begins with a holistic vision of the child through all developmental aspects (moral, religious, emotional, social, linguistic, physical, health, and mental). This integration could be achieved through taking into consideration the needs and rights of children and developing curricula that consider these needs and capacities to provide opportunities for developing and supporting the developmental aspects of the child. The contemporary technological developments in the field of computer and the Internet have brought with it new forms, ideas, and problems for children in recent years

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Robust Estimation For Location Parameter
...Show More Authors

 In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Construction Bullying scale for Kindergarten child
...Show More Authors

Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF