Preferred Language
Articles
/
BRbbxYcBVTCNdQwCemFI
Calculation of Electron Drift Velocity in Xenon Gas Using Boltzmann Equation Analysis
...Show More Authors

Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the stress concentration of different incisal ridge preparations of porcelain veneers (Finite element analysis)
...Show More Authors

Background: Porcelain veneers are under a great deal of stress which may lead to clinical failure as fracture or dettachment. This study examined whether different finishing lines and lingual shoulder preparations in the incisal area of the maxillary central incisor affect the bond of the porcelain veneers. Materials and methods: A two- dimensional finite element model was made. Location and magnitude of maximum Von Mises stresses were calculated in porcelain veneer. Six types of preparations were drawn as:incisal overlap of 0.5mm, 1mm and 1.5mm depth and lingual shoulder, and incisal overlap of 0.5mm, 1mm and 1.5mm depth without shoulder preparation. Results: Stress formation is maximum in the incisal edge region. All the lingual shoulder

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Analysis of the Effects of Aggressive Shot Peening on Fatigue Life of 7075 – T6 Aluminum Alloy
...Show More Authors

 For many years controlled shot peening was considered as a surface treatment. It is now clear that the performance of control shot peening in terms of fatigue depends on the balance between its beneficial (compressive residual stress and work hardening) and beneficial effects (surface hardening).

The overall aim of this paper is to study the effects of aggressive shot peening on fatigue life of 7075 – T6 aluminum alloy. The fatigue life reduction factor (LRF) due to the aggressive shot peening was established and empirical relations were proposed to describe the behavior of LRF, roughness and fatigue life. The benefits of shot peering in terms of fatigue life are dependent on the shot peening time (SPT).

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 09 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation,
The Violation of Religious Human Rights: A sample Analysis of an Offensive Image of Islamic Concept
...Show More Authors

The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju

... Show More
Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
Investment of Propaganda in Al-Rafidain and Al- Sharqiya News Channels: Content Analysis of News Bulletins from 1/12/2016 to 29/2/2016
...Show More Authors

The technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.The technological developments in the field of communication hav

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 24 2024
Journal Name
مداد الآداب
Navigating the Evolving Tourism Landscape: Examining the Challenges and Opportunities for TripAdvisor and Travelocity in the Era of AI:A Comparative Analysis of Innovation Strategies
...Show More Authors

The tourism industry has undergone exponential transformation, reshaped by online travel agencies (OTAs), shifting consumer preferences, and technological advancements. Established OTAs like TripAdvisor and Travelocity face pressures to adapt their strategies to capitalize on these disruptive landscape changes. This research involves a comparative analysis examining the key challenges confronting TripAdvisor and Travelocity, with a focus on opportunities to leverage artificial intelligence (AI) in enhancing personalization and the traveler experience. The study utilizes publicly available data on the companies and academic literature on AI innovation diffusion. Findings reveal that while TripAdvisor has actively developed AI-based trip plan

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Feeble Hausdorff spaces in alpha-topological spaces using graph
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Oct 06 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing

... Show More
View Publication
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Earned Value Method in Project Control Applied research
...Show More Authors

   There is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.

Earned Value Method is used in the project o

... Show More
View Publication Preview PDF
Crossref