Preferred Language
Articles
/
joe-2279
Implementation of Digital Image processing in Calculating Normal Approach for Spherical Indenter Considering Elastic/Plastic Contact
...Show More Authors

In this work a study and calculation of the normal approach between two bodies,
spherical and rough flat surface, had been conducted by the aid of image processing
technique. Four kinds of metals of different work hardening index had been used as a
surface specimens and by capturing images of resolution of 0.006565 mm/pixel a good estimate of the normal approach may be obtained the compression tests had been done in strength of material laboratory in mechanical engineering department, a Monsanto tensometer had been used to conduct the indentation tests. A light section measuring equipment microscope BK 70x50 was used to calculate the surface parameters of the texture profile like standard deviation of asperity peak heights, centre line average, asperity density and the radius of asperities. A Gaussian distribution of asperity peak height was assumed in calculating the theoretical value of the normal approach in the elastic and plastic regions and where compared with those obtained experimentally to verify the obtained results. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
Mesopotamian Journal Of Cyber Security
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
...Show More Authors

The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculating the Resolving Power For Symmetrical Double Pole Piece Magnetic Lenses By Using A Preassigned Analytical Functions
...Show More Authors

 In this theoretical paper  and depending on the optimization synthesis method for electron magnetic lenses a theoretical  computational investigation was carried out to calculate the Resolving Power for the symmetrical double pole piece magnetic lenses,  under the absence of magnetic saturation, operated by the mode of telescopic operation by using symmetrical magnetic field for some analytical functions well-known in electron optics such as Glaser’s Bell-shaped model,  Grivet-Lenz model, Gaussian field model  and Hyperbolic tangent field model.       This work can be extended further by using the same or other models for asymmetrical or symmetrical axial magnetic field

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using The Ultrasonic Waves For Studying Thermal And Elastic Properties as a Function of Porosity in Sintered ceramic
...Show More Authors

Ultrasonic pulse echo measurements on porous alumina as ceramic

material with porosities ranging from (20-40)% showed effect of volume

fraction of porosity on both thermal and elastic properties. A quadratic relationships, by using a least squares method, is deduced for the dependence of the shear velocity, longitudinal velocity, shear modulus, Young's modulus,  bulk  modulus, Poisson 's ratio, Debye temperature, specific heat, and thermal conductivity on the total  porosity. By these relationships,  the  thermal  and  elastic  properties  results  of  pore-free alumina  were  calculated.  The  elastic  properties  results  of  

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
مجلة نسق
Evaluating the Students’ Performance in the College of Education for Women in Using the Digital Transformation
...Show More Authors

This study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio

... Show More
View Publication
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Proton momentum distributions and elastic electron scattering form factors for some Ge isotopes
...Show More Authors

The proton momentum distributions (PMD) and the elastic
electron scattering form factors F(q) of the ground state for some
even mass nuclei in the 2p-1f shell for 70Ge, 72Ge, 74Ge and 76Ge are
calculated by using the Coherent Density Fluctuation Model (CDFM)
and expressed in terms of the fluctuation function (weight function)
|F(x)|2. The fluctuation function has been related to the charge
density distribution (CDD) of the nuclei and determined from the
theory and experiment. The property of the long-tail behavior at high
momentum region of the proton momentum distribution has been
obtained by both the theoretical and experimental fluctuation
functions. The calculated form factors F (q) of all nuclei under s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Target Costing in Implementation Confrontational Strategy Applied study in General Company for Electronic Industries
...Show More Authors

This research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy  and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.

The economic units are not differentiators and not c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation for 3-DoF SCARA Robot based PLC
...Show More Authors

Abstract 

This paper presents mechanical and electrical design, and implementation  process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Development and Implementation a Programmable Model for Evaluation Pumping Technique
...Show More Authors

This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Watermarking for Mobile Device
...Show More Authors

The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore,  the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of  the mobile network and its wide usage through  different types  of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat

... Show More
View Publication Preview PDF