Preferred Language
Articles
/
joe-1855
Material Selection for Unmanned Aerial Vehicles (UAVs) Wings Using Ashby Indices Integrated with Grey Relation Analysis Approach Based on Weighted Entropy for Ranking
...Show More Authors

The designer must find the optimum match between the object's technical and economic needs and the performance and production requirements of the various material options when choosing material for an engineering application. This study proposes an integrated (hybrid) strategy for selecting the optimal material for an engineering design depending on design requirements. The primary objective is to determine the best candidate material for the drone wings based on Ashby's performance indices and then rank the result using a grey relational technique with the entropy weight method. Aluminum alloys, titanium alloys, composites, and wood have been suggested as suitable materials for manufacturing drone wings. The requirements for designing a drone's wings are to make them as light as possible while meeting the stiffness, strength, and fracture toughness criteria. The conclusion indicates that Carbon Fiber-Reinforced Polymer (CFRP) is the best material for producing drone wings. In contrast, wood and aluminum alloys were the cheapest materials when the design had to be inexpensive.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Identify and Diagnose the Causes of Financial Funding using the Root Cause Analysis Technique
...Show More Authors

The analysis of the root cause techniques is a reasonable option to be made to assess the root causes of the funding of construction projects. There are a variety of issues related to financing in construction industries in Iraq. The root,cause analysis is the impact of security and social conditions on financial funding. Variety tools of root cause analysis have originated from literature, as common methods for the detection of root causes. The purpose of this study was to identify and diagnose causes that lead to obstruction of financial funding in the construction projects in the republic of Iraq from the contractors' point of view and their interaction with a number of variables. The study diagnosed nine causes of fi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
An Experimental Analysis of Embankment on Stone Columns
...Show More Authors

When embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Systematic analysis of artistic work as an introduction to planning training for teaching art education to students of Sultan Qaboos University
...Show More Authors

The current research aims to train students to take benefit of their studies to analyze and taste the artistic works as one of the most important components of the academic structure for students specializing in visual arts; then to activate this during training them the methods of teaching. Consequently, the capabilities of mind maps were employed as a tool that would be through freeing each student to analyze a model of artistic work and think about his analytical principles according to what he knows. Then, a start-up with a new stage revolves around the possibility of transforming this analysis into a teaching style by thinking about how the student would do. The same person who undertook the technical analysis should offer this work

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of feeding pattern on the stage of primary dentition eruption in relation to growth parameters
...Show More Authors

Background: Feeding is a complicated process that involves the coordination of cardiovascular, respiratory, gastrointestinal (GI), and oropharyngeal mechanisms, with support from the musculoskeletal and craniofacial systems. The practice of feeding could be correlated with eruption stage and nutritional status in infants. Aim of the study: This study aimed to assess the relation of feeding patterns to a selected oral variable (stage of the eruption of primary teeth) and growth parameters among clinically healthy infants. Subjects and Methods: A cross-sectional comparative study on a sample of (300) infants aged between 6 and 18 months was performed in Karbala City, Iraq. The feeding pattern was investigated using an information sheet ans

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
New Results of Normed Approach Space
...Show More Authors

     In this work, we introduce  a new convergence formula. We also define cluster point , δ-Cauchy sequence, δ-convergent, δ-completeness , and define sequentially contraction  in approach space. In addition, we prove the contraction condition is necessary and sufficient to get the  function is sequentially contraction  as well as we put a new structure for the norm in the approach space which is called approach –Banach space, we discuss the normed approach space with uniform condition is a Hausdorff space. Also, we prove a normed approach space is complete if and only if the metric generated from approach space is complete as well as prove every finite –dimensional approach normed space is δ-complete. We prove several r

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Visceral Leishmaniasis (Anew Approach in diagnosis)
...Show More Authors

This Study· is to investigate the Visceral LeishmaniEJ,sis among 8

susp<:;cted   infants and  young chUdren admitted  1o  AI-Khadhtmiya

Pediatric  Hospital   in Baghdad  between  January  1,2005 o August

31,2005  .For  each  patieni,   a  medical   history  was  obtained  and   a complete physical  examination  was  performed   by physicians  . The serums  of  the .suspected  c_es  were primarily diagnosed by using a new ,simple diagnostic method  bas.ed  on detecting antib9dies  against the  recombinant  K 39  

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More