Preferred Language
Articles
/
joe-2279
Implementation of Digital Image processing in Calculating Normal Approach for Spherical Indenter Considering Elastic/Plastic Contact
...Show More Authors

In this work a study and calculation of the normal approach between two bodies,
spherical and rough flat surface, had been conducted by the aid of image processing
technique. Four kinds of metals of different work hardening index had been used as a
surface specimens and by capturing images of resolution of 0.006565 mm/pixel a good estimate of the normal approach may be obtained the compression tests had been done in strength of material laboratory in mechanical engineering department, a Monsanto tensometer had been used to conduct the indentation tests. A light section measuring equipment microscope BK 70x50 was used to calculate the surface parameters of the texture profile like standard deviation of asperity peak heights, centre line average, asperity density and the radius of asperities. A Gaussian distribution of asperity peak height was assumed in calculating the theoretical value of the normal approach in the elastic and plastic regions and where compared with those obtained experimentally to verify the obtained results. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Statistical Mean Studying for Detected Intensities by Enet Web Camera for the White Test Image Under Different Fluorescent Lightness
...Show More Authors

    The aim of this work, is to study color filming by using different intensities of fluorescent light, where we evaluate the capture image qualities for the RGB bands and component of L. And we study the relation between the means of RGBL values of the images as a function of the power of fluorescent light circuit . From the results, we show that the mean μ increases rapidly at low power values, then it will reach the stability at high power values.  

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Investigation the Opportunity of BIM with Agile Management Approach in Iraqi Construction Projects
...Show More Authors

The construction industry in Iraq suffers from many problems, perhaps the most important of which is the delay in time and the increase in costs. Therefore, it was necessary to try to adopt a new methodology that would help in overcoming these problems. It was suggested to combine building information modeling with the agile management approach because this technique and methodology is modern and helps in reducing time and cost and improving quality. This paper aims to know the status of using Building Information Modeling (BIM) and Agile Project management (APM) in Iraq and to shed light on the merging of this integration, explaining the benefits, difficulties, and workflow practices, finding the most influencing factors on the tim

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of Robotics
Real-Time SLAM Mobile Robot and Navigation Based on Cloud-Based Implementation
...Show More Authors

This study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database

... Show More
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
Legal Legislation and Freedom of Expression / Historical Approach
...Show More Authors

Freedom of opinion and expression occupy the first place among the concerns of countries and international organizations. And it is also the basis of contemporary freedom because it is the foundation for achieving freedom in other fields such as politics, economics, education, etc.. The constitutions of the state have ensured that almost the entire freedom to express an opinion in all its forms either orally or writing or images of expressions, but these freedoms are identified within the law. Most countries announced their commitment to the international conventions and texts issued by international and regional organization like the Universal Declaration of Human Rights in 1948, and the International Covenant on Civil and Political Rig

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
Analytical Study of National Housing Finance Policies and Implementation Strategies Case Study: Baghdad Governorate
...Show More Authors

           Housing finance is one of the main components of housing, and it is relied upon to help families buy, build, add building, and housing improve. Accordingly, different countries all over the world set policies and strategies for the purpose of organizing and developing the financial sector to solve quantitative and qualitative housing problems.

This research aims to identify housing finance policies and strategies in Iraq and Baghdad governorate.

The most prominent sources of housing financing are the Real Estate Bank and the Housing Fund, and accordingly the focus has been on the role of these two institutions in filling

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
British Journal Of Oral And Maxillofacial Surgery
A novel approach for the three-dimensional evaluation of facial asymmetry of unilateral cleft lip and palate patients (UCLP)
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
Investigating The Ideology of Bullying in Hunt’s Fish in a Tree: A Critical Stylistic Approach
...Show More Authors

         Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Journal Of Pharmaceutical, Chemical And Biological Sciences
BRCA1 is Overexpressed in Breast Cancer Cell Lines and is Negatively Regulated by E2F6 in Normal but not Cancerous Breast Cells
...Show More Authors

This study focused on the expression and regulation of BRCA1 in breast cancer cell lines compared to normal breast. BRCA1 transcript levels were assessed by real time quantitative polymerase chain reaction (RT-qPCR) in the cancer cell lines. Our data show overexpression of BRCA1 mRNA level in all the studied breast cancer cell lines: MCF-7, T47D, MDA-MB-231 and MDA-MB-468 along with Jurkat, leukemia T-lymphocyte, the positive control, relative to normal breast tissue. To investigate whether a positive or negative correlation exists between BRCA1 and the transcription factor E2F6, three different si-RNA specific for E2F6 were used to transfect the normal and cancerous breast cell lines. Interestingly, strong negative relationship was found b

... Show More
Preview PDF