Preferred Language
Articles
/
joe-125
Effect of Electrical Discharge Machining and Shot Blast Peening Parameters on Fatigue Life of AISI D2 Die Steel
...Show More Authors

The present paper deals with studying the effect of electrical discharge machining (EDM) and shot blast peening parameters on work piece fatigue lives using copper and graphite electrodes. Response surface methodology (RSM) and the design of experiment (DOE) were used to plan and design the experimental work matrices for two EDM groups of experiments using kerosene dielectric alone, while the second was treated by the shot blast peening processes after EDM machining. To verify the experimental results, the analysis of variance (ANOVA) was used to predict the EDM models for high carbon high chromium AISI D2 die steel. The work piece fatigue lives in terms of safety factors after EDM models were developed by FEM using ANSYS 15.0 software. The results appeared that the experimental fatigue safety factors (at 106 cycles) decreased by (11 %) after EDM using copper electrodes compared with as-received material and this value is higher by (3.35 %) when using graphite electrodes. The fatigue strength at the same number of cycles was (0.88) and (0.84) times the fatigue strength of as-received material for copper and graphite electrodes respectively. While fatigue strength and safety factors increased after EDM when increasing shot peening time, at the higher shot peening time is by (19.1 %) when using copper electrodes and by (23.26 %) when using graphite electrodes.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Impact of the Use of Piano on the Development of Musical Possibilities of Violinists
...Show More Authors

This research is to take advantage of the performance capabilities which the piano has become famous with and transfer the impact of that advantage to the possibilities of playing the violin. The research aims to introduce the effect of using the piano on the development of the violinists' musical potential. The research, in its literature, focuses on the interpretation of the impact on the possibility of both instruments (piano and violin) in two main sections: the piano (its origin, potential and role in music) and the violin (its origin, potential and role in music). The procedures of the research consisted of presenting a special analysis of a questionnaire consisting of a number of questions presented by the researcher to her resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Evaluation of the functional response of Chrysoperla carnea (Stephens) (Neuroptera:Chrysopidae) larvae feeding on cabbage aphid, Brevicoryne brassicae (L.)(Homoptera: Aphididae) in laboratory
...Show More Authors

This study evaluated the functional response of the larva of the predator Chrysoperla carnea by offering varying densities of cabbage aphid, Brevicoryne brassicae (L.) . Results showed conformity with type–II functional response, where the number of prey killed approaches asymptote hyperbolically as prey density increases (declining proportion of prey killed or the inverse density dependent) till it reached the stability stage determined by handling time and predator satiation. Also, the values of attack rate and handling time changed with age progress for both predator and prey. It has been observed an increase in the attack rate and reduction in handling time with the progress of the predator age when feeding on a particular nymphal in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Lean accounting and its rolls for calculated costs on value stream
...Show More Authors

At the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system .                 

      Lean Accounting that has appeared as aresponse for changes occurred of economic units adoption for lean accounting system instead of wide production system : through it management of economic units has been changed from management by top departments into management by value flows : has provide new method for accounting costs according to value flow

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt/egyptology
EMIRATI-ISRAELI NORMALIZATION AND ITS IMPACT ON THE PALESTINIAN-ISRAELI CONFLICT
...Show More Authors

The Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 28 2022
Journal Name
Mechanics Based Design Of Structures And Machines
Experimental investigation on the damping characteristics in dry and saturated sands
...Show More Authors

Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More