Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch. The model has been implemented to represent the surface. The interior data of the desired surfaces designed by MATLAB software have been transformed to UG-NX8 software to get the machining process simulation and G-code programs for the model, as well as a virtual machining process has been simulated to show the machining pitfalls, using CIMCO edit software. The sample has been machined using 3-axis vertical CNC machine. Finally, the sample has been measured using (CMM inspection) and it’s found that the average of error (0.144 mm).
In this study; a three-dimensional model was created to simulate groundwater in Al-Haydariyah area of the governorate of Al-Najaf. A solid model was created to utilize the cross sections of 25 boreholes in the research region, and it was made out of two layers: sand and clay. The steady-state calibration was employed in six observation wells to calibrate the model and establish the hydraulic conductivity, which was 17.49 m/d for sand and 1.042 m/d for clay, with a recharge rate of 0.00007 m/day. The wells in the research region were reallocated with a distance of 1500 m between each well, resulting in 140 wells evenly distributed throughout the study area and with a discharge of 5 l/s, and the scenarios were run for 1000
... Show MoreAdenosine deaminase (ADA) and lipid profile may be associated with some diseases. Parasitic diseases have also been reported to be associated with ADA and lipid profiles. This study aimed to evaluate ADA, lipid profile, and total protein among children infected with E.vermicularis. This research was carried out in Baghdad province from October 2021 to the end of March 2022. One hundred samples were collected from both sexes, ranging in age from (3-16) years. They all underwent examination for ADA, cholesterol, low-density lipoprotein (LDL), high-density lipoprotein (HDL), and total protein levels. Results showed no significant differences between E.vermicularis positive group and E.vermicularis negative group regarding ADA, LDL, and trig
... Show MoreA new technique in cultivation by installing membrane sheet below the crop’s root zone was helped to save irrigation water in the root zone, less farm losses, increasing the field water use efficiency and water productivity. In this paper, the membrane sheet was installed below the root zone of zucchini during the summer growing season 2017 in open field. This research was carried out in a private field in Babil governorate at Sadat Al Hindiya Township reached 72 km from Baghdad. Surface trickle irrigation system was used for irrigation process. Two treatment plots were used, treatment plot T1 using membrane sheet and treatment plot T2 without using the membrane sheet. The applied irrigation water, time of
... Show MoreThe selection of proper field survey parameters of electrical resistivity can significantly provide efficient results within a reasonable time and cost. Four electrode arrays of 2D Electric Resistivity Imaging (ERI) surveys were applied to characterize and detect subsurface archaeological bodies and to determine the appropriate array type that should be applied in the field survey. This research is to identify the subsurface features of the Borsippa archaeological site, Babylon Governorate, Middle Iraq. Synthetic modeling studies were conducted to determine the proper array and parameters for imaging the shallow subsurface features or targets. The efficiency of many array types has been tested for the detection the buried archaeolog
... Show MoreComputer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4th order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show More