Preferred Language
Articles
/
ixeoZ48BVTCNdQwCEnZi
Experimental and Numerical Analysis of Laser Surface Melting by Using Enthalpy Method
...Show More Authors
Abstract<p>In this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3<italic>ms</italic>, wavelength 1064nm, laser energies 1.5, 2. 6 and 4.3 J, laser beam diameter is 0.6 mm and spot diameter 0.78 mm was applied a low carbon steel type St37 with a dimension 10, 10, 3 mm, length, width and thickness respectively. Numerical analysis side consist of a mathematical model and calculating a thermal cycle by using equation in the enthalpy method applied to determine the cooling rate in fusion zone. The simulation by using the enthalpy method, applied on conduction heat transfer to estimate the cooling rate model in fusion zone and heat affected zones. Cooling rates models are helping to estimate the microstructure and micro hardness distribution in fusion and heat affected zones. The complication of the heat transfer in laser surface melting process, because at in rapid solidification, therefore the enthalpy model is more appropriate for this case. The result shows that increases of laser energy lead to decrease cooling rates and increase width and penetration of fusion zone, also decrease micro hardness in fusion zone and we found an increase in the pool size of fusion and heat affected zones.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Bifurcation Analysis of Food Web Prey- Predator Model with Toxin
...Show More Authors
Abstract<p>Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point <italic>E</italic> <sub>0</sub>, and it revealed the existence of saddle-node bifurcation occurred at equilibrium points <italic>E</italic> <sub>1</sub>, <italic>E</italic> <sub>2</sub> and <italic>E</italic> <sub>3</sub>. At any point, the occurrence of bifurcation of the pitch for</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Fri Mar 15 2024
Journal Name
Al-adab Journal
A Rhetorical Stylistic Analysis of English Political Headlines in Selected Newspapers
...Show More Authors

This study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern h

... Show More
View Publication
Crossref
Publication Date
Fri Jun 02 2017
Journal Name
International Journal Of Medical Research & Health Sciences
Analysis of HLA-DQB1 Alleles Frequency in Patients with Chronic Periodontitis
...Show More Authors

Publication Date
Sun Jun 18 2023
Journal Name
International Journal Of Development In Social Sciences And Humanities
A CRITICAL DISCOURSE ANALYSIS OF SELECTED POLITICAL SPEECH ON ONLINE EDUCATION
...Show More Authors

PDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2023

View Publication
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Stability Analysis with Bifurcation of an SVIR Epidemic Model Involving Immigrants
...Show More Authors

There are many factors effect on the spread of infectious disease or control it,
some of these factors are (immigration and vaccination). The main objective of this
paper is to study the effect of those factors on the dynamical behavior of an SVIR
model. It is assumed that the disease is spread by contact between members of
populations individuals. While the recovered individuals gain permanent immunity
against the disease. The existence, uniqueness and boundedness of the solution of
this model are investigated. The local and global dynamical behaviors of the model
are studied. The local bifurcations and Hopf bifurcation of the model are
investigated. Finally, in order to confirm our obtained results and specify t

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
content Analysis for Some Type of Pillows used in Iraqi houses
...Show More Authors

content Analysis for Some Type of Pillows used in Iraqi houses

View Publication Preview PDF
Publication Date
Tue May 11 2021
Journal Name
Egyptian Journal Of Medical Human Genetics
Molecular analysis of CFTR gene mutations among Iraqi cystic fibrosis patients
...Show More Authors
Abstract<sec> <title>Background

Cystic fibrosis (CF) is an autosomal recessive multisystem disease that results from mutation(s) of the cystic fibrosis transmembrane conductance regulator (CFTR) gene. More than 2100 mutations and polymorphisms have been reported in this gene so far. Incidence and genotyping of CF are under-identified in Iraq. This study aims to determine the types and frequencies of certain CFTR mutations among a sample of Iraqi CF patients. Two groups of patients were included: 31 clinically confirmed CF patients in addition to 47 clinically suspected patients of CF. All confirmed pa

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Financial Analysis in Investors Decisions ( Iraqi Stock Exchange )
...Show More Authors

  The research aims to reveal the role of financial analysis in rationalizing the investor decision on the Iraqi stock Exchange market, by studying the relationship and impact techniques and methods of financial analysis on the decisions of investors in the market. The most important techniques and methods discussed in this study were: analysis (financial ratios analysis, comparison of financial statements analysis, cash flow statement analysis) for companies listed in the Iraqi stock Exchange market. The researcher adopted the analytical descriptive method which depends on the collection of data on the phenomenon and its interpretation. The questionnaire wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (4)
Crossref