Preferred Language
Articles
/
joe-2095
Implementation of Digital Image processing in Calculating Normal Approach for Spherical Indenter Considering Elastic/Plastic Contact
...Show More Authors

In this work a study and calculation of the normal approach between two bodies, spherical and rough flat surface, had been conducted by the aid of image processing technique. Four kinds of metals of different work hardening index had been used as a surface specimens and by capturing images of resolution of 0.006565 mm/pixel a good estimate of the normal approach may be obtained the compression tests had been done in strength of material laboratory in mechanical engineering department, a Monsanto tensometer had been used to conduct the indentation tests.
A light section measuring equipment microscope BK 70x50 was used to calculate the surface parameters of the texture profile like standard deviation of asperity peak heights, centre line average, asperity density and the radius of asperities.
A Gaussian distribution of asperity peak height was assumed in calculating the theoretical value of the normal approach in the elastic and plastic regions and where compared with those obtained experimentally to verify the obtained results.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 12 2023
Journal Name
Periodical Of Engineering And Natural Sciences
Digital citizenship for faculty of Iraqi universities
...Show More Authors

Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Digital Photo credibility and its reflection on the cognitive process of journalistic image of Viewers: زيـاد طـارق شـــاكر
...Show More Authors

Represent the current study and tagged (the credibility of digital image and its reflection on the process of cognitive picture releases) scientific effort is designed to detect realizing press releases and the extent affected the credibility of the digital image by selecting the relationship between digital photo and the extent of their credibility on the one hand and between the process of cognition and Press Photo of the hand Other than the consequent establishment researcher collects materials to serve the scientific research topic in three chaptersCombine the first one methodological framework for the search of the research problem and its significance and the desired objective be achieved together with the definition of the most im

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Iraqi Journal Of Science
Calculating the Variation of the Universal Parameter (Variable) Using Kepler's Equation for Different Orbits
...Show More Authors

Stumpff functions are an infinite series that depends on the value of z. This value results from multiplying the reciprocal semi-major axis with a universal anomaly. The purpose from those functions is to calculate the variation of the universal parameter (variable) using Kepler's equation for different orbits. In this paper, each range for the reciprocal of the semi-major axis, universal anomaly, and z is calculated in order to study the behavior of Stumpff functions C(z) and S(z). The results showed that when z grew, Stumpff functions for hyperbola, parabola, and elliptical orbits were also growing. They intersected and had a tendency towards zero for both hyperbola and parabola orbits, but for elliptical orbits, Stumpff functions

... Show More
Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Shaft Resistance of Long (Flexible) Piles Considering Strength Degradation
...Show More Authors

Soil-structure frictional resistance is an important parameter in the design of many foundation systems. The soil-structure interface area is responsible for load transferring from the structure to the surrounding soil. The mobilized shaft resistance of axially loaded, long slender pile embedded in dense, dry sand is experimentally and numerically analyzed when subjected to pullout force. Experimental setup including an instrumented model pile while the finite element method is used as a numerical analysis tool. The hypoplasticity model is used to model the soil adjacent to and surrounding the pile by using ABAQUS FEA (6.17.1). The soil-structure interface behavior depends on many factors, but mainly on the interface soi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of Engineering
Thermal Performance of Plastic Receiver in Solar Collector
...Show More Authors

A plastic tubes used as absorber of active flat plate solar collector (FPSC) for heating water were studied numerically and experimentally. The set-up is located in Babylon (republic of Iraq) 43.80 East longitude and 32.30 North latitude with titled of 450 toward the south direction.  The study involved three dimensions mathematical model for flat coil plastic absorber which solved by FLUENT-ANSYS-R.18 program. Experiments were conducted at outdoor conditions for clear days on January and February 2018 with various water volume flow rates namely (500, 750, 1000, 1250, and 1500 Liter per hour LPH) on each month for Reynolds number range of (1 x 104 to 5 x 104) th

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Advances In Bioresearch
Study of the Pest insects in Plastic Houses
...Show More Authors

Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF