Preferred Language
Articles
/
joe-2574
Defects Analysis of Tee-Section Welding Using Friction Stir Welding Process of Aluminum
...Show More Authors

Friction stir welding (FSW) of Tee-joints is obtained by inserting a specially designed rotating pin into the clamped blanks, through top plate (skin) to bottom plate (stringer), and then moving it along the joint, limiting the contact between the tool shoulder and the skin. The present work aims to investigate the defects occur for Tee-joint of an Aluminum alloy (Al 5456) with dimensions (180mm x 70mm) for the skin plate, (180mm x 30mm) for stringer plate and thickness of (4mm).
The effects of welding parameters such as rotational speed, linear speed, plunging depth, tool tilting, and die radii of welding fixture on the welding quality of Aluminum Alloy will be studied. Weld defects had been summarized and studied, and then the best conditions that led to good welds had been estimated.
 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Signal Processing Techniques for Diagnosis Rotor Faults in Small Wind Turbine Motor
...Show More Authors

The core objective of this paper was to diagnosis and detect the expected rotor faults in small wind turbine SWT utilize signal processing technique. This aim was achieved by acquired and analyzed the current signal of SWT motor and employed the motor current signature analysis MCSA to detect the sudden changes can have occurred during SWT operation. LabVIEW program as a virtual instrument and (NI USB 6259) DAQ were take advantage of current measurement and data processing.

View Publication Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Weibull Parameters and Wind Power Assessment for Three Locations in Iraq
...Show More Authors

In this research, we built a program to assess Weibull parameters and wind power of three separate locations in Iraq: Baghdad, Basrah and Dhi-qar for two years 2009 and 2010, after collecting and setting the data available from the website "Weather Under Ground" for each of the stations Baghdad, Basrah and Dhi-qar. Weibull parameters (shape parameter and scale parameter) were estimated using maximum likelihood estimation method (MLE) and least squares method (LSM). Also, the annual wind speed frequencies were calculated noting speed most readily available through the above two years. Then, we plotted Weibull distribution function and calculate the most significant quantities represented by mean wind speed, standard deviation of the value

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Analyzing the Literary Criticism Book Questions for High School Stage According to Bloom's Classification
...Show More Authors

Abstract

 The current research aims to identify the analysis of the questions for the book of literary criticism for the preparatory stage according to Bloom's classification. The research community consists of (34) exercises and (45) questions. The researcher used the method of analyzing questions and prepared a preliminary list that includes criteria that are supposed to measure exercises, which were selected based on Bloom's classification and the extant literature related to the topic. The scales were exposed to a jury of experts and specialists in curricula and methods of teaching the Arabic language. The scales obtained a complete agreement. Thus, it was adapted to become a reliable instrument in this

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Proposed Mechanism for Financial Reporting on Sustainable Investment and Its Role in Achieving Value Added - Applied in the Iraqi Midland Refineries Company-
...Show More Authors

The research aims to develop a proposed mechanism for financial reporting on sustainable investment that takes the specificity of these investments.

To achieve this goal, the researcher used (what if scenario) where the future financial statements were prepared for the year 2026, after completion of the sustainable project and operation, as the project requires four years to be completed.

The researcher relied on the results of the researchers collected from various modern sources relevant to the research topic and published on the internet, and the financial data and information obtained to assess the reality of the company's activity and its environmental, social, and economic i

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
An Analytical Study of Viewpoint in Parsi Pour's and Ar-Rikabi's Novels: The Dog and the Long Night and Alibaba's Sad Night as Examples: بررسی تحليلی زاویه¬ی دید در رمان¬های پارسی پور و الرکابی باتكيه بر رمان "سگ و زمستان بلند" و "ليل علی بابا الحزین"
...Show More Authors

It is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On A Bitopological (1,2)*- Proper Functions
...Show More Authors

   In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
 

View Publication Preview PDF
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Boosting E-learner’s Motivation through Identifying his/her Emotional States
...Show More Authors

The main objective of e-learning platforms is to offer a high quality instructing, training and educational services. This purpose would never be achieved without taking the students' motivation into consideration. Examining the voice, we can decide the emotional states of the learners after we apply the famous theory of psychologist SDT (Self Determination Theory). This article will investigate certain difficulties and challenges which face e-learner: the problem of leaving their courses and the student's isolation.
Utilizing Gussian blending model (GMM) so as to tackle and to solve the problems of classification, we can determine the learning abnormal status for e-learner. Our framework is going to increase the students’ moti

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF