Preferred Language
Articles
/
joe-1958
Study of the Friction Stir Welding For A516 Low Carbon Steel
...Show More Authors

The main objective of present work is to describe the feasibility of friction stir welding (FSW) for
joining of low carbon steel with dimensions (3 mm X 80 mm X 150 mm). A matrix (3×3) of welding
parameters (welding speed and tool rotational speed) was used to see influence of each parameter on
properties of welded joint .Series of (FSW) experiments were conducted using CNC milling machine
utilizing the wide range of rotational speed and transverse speed of the machine. Effect of welding
parameters on mechanical properties of weld joints were investigated using different mechanical tests
including (tensile and microhardness tests ). Micro structural change during (FSW) process was
studied and different welding zones were investigated using optical microscope. The stir welding
experiments conducted that show the low carbon steel can be welded using (FSW) process with
maximum welding efficiency (100.02%) in terms of ultimate tensile strength using best result of
welding parameters (700 RPM, 25 mm/min, tool rotational speed and welding speed respectively and
0.2 mm plunging depth of welding tool) ,there is afirst time that we obtain the efficiency reach to
100.02 % to weld this type of low carbon steel by FSW. The corrosion resistance was measure which
is the new test on the welding by this way and we obtained different result from the result on
traditional welding processes and the result that obtained show the corrosion resistance for this
welding plate better than the base metal. Maximum temperature has been calculated numerically by
using the ANSYS program. The obtained peak temperature is 1102°C, A percentage minimum of the
melting point .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Algebraic strategy to generate pairwise test set for prime number parameters and variables
...Show More Authors

View Publication
Scopus (21)
Crossref (17)
Scopus Crossref
Publication Date
Mon Dec 21 2020
Journal Name
2020 Emerging Technology In Computing, Communication And Electronics (etcce)
An Integrated Grey Wolf Optimizer with Nelder-Mead Method for Workflow Scheduling Problem
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Matter Density Distributions and Reaction Cross Sections for 8Li and 22N Exotic Nuclei
...Show More Authors

     The Harmonic Oscillator (HO) and Gaussian (GS) wave functions within the Binary Cluster Model (BCM) were employed to investigate neutron, proton and matter densities of the ground state as well as the elastic proton form factors of one neutron 8Li and 22N halo nuclei. The long tail is a property that is clearly shown in the neutron density. The existence of a long tail in the neutron densities of 8Li and 22N indicates that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section  of these nuclei were calculated using the Glauber model.

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Calculating Parameters for Se and Tin Plasmas Produced by Pulsed Nd: YAG Laser
...Show More Authors

      In this study, the plasma formed by the preparation of Se and Tin (Sn) using a Nd: YAG laser with a wavelength of 1064 nm in air, which was then studied using the technique of optical emission spectrum, was presented (OES).The laser-induced plasma parameters such an electron temperature (Te) were identified using two-ratio methods, using Stark broadening methods to determine the density of electrons (ne). According to the findings, there is a correlation between the amount of laser energy that is applied and the increase in the emission intensity of the spectral lines. In the case of Se plasma, an increase in laser energy causes a rise in the temperature of the electrons. While increasing the temperature of the elec

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 27 2016
Journal Name
Mine Water Environ.
Dominant Mechanisms for Metal Removal from Acidic Aqueous Solutions by Cement Kiln Dust
...Show More Authors

Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Wireless Communications And Mobile Computing
Corrigendum to “Developing a Video Buffer Framework for Video Streaming in Cellular Networks”
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF