Preferred Language
Articles
/
ZhZJSokBVTCNdQwCwoi6
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Journal Of Engineering
Water Hammer Arresters; Review Studies and Practical Experiments for Alternatives
...Show More Authors

The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe

... Show More
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Practical Study for the Properties of Hueckel Edge Detection Operator
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Engineering
Hydraulic Characteristics and Discharge of Canal Sluice Gate: Practical Approach
...Show More Authors

Simplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 22 2023
Journal Name
Actuators
Practical Adaptive Fast Terminal Sliding Mode Control for Servo Motors
...Show More Authors

Position control of servo motor systems is a challenging task because of inevitable factors such as uncertainties, nonlinearities, parametric variations, and external perturbations. In this article, to alleviate the above issues, a practical adaptive fast terminal sliding mode control (PAFTSMC) is proposed for better tracking performance of the servo motor system by using a state observer and bidirectional adaptive law. First, a smooth-tangent-hyperbolic-function-based practical fast terminal sliding mode control (PFTSM) surface is designed to ensure not only fast finite time tracking error convergence but also chattering reduction. Second, the PAFTSMC is proposed for the servo motor, in which a two-way adaptive law is designed to further s

... Show More
View Publication
Scopus (25)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Water Hammer Arresters; Review Studies and Practical Experiments for Alternatives
...Show More Authors

The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 20 2010
Journal Name
Indian Journal Of Science And Technology
Investigation on picosecond laser ablation of dental material using FIB/SEM techniques
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
The Impact of Fear and Rational Appeal Scam Techniques on Individual Susceptibility
...Show More Authors

Scams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref