The purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE program, which is from CAD-CAM software's that used to redesign and modify on point of cloud in 3D modeling. This paper presents reverse engineering (RE) of the flange of water pump. Used mechanical and damaged parts have been selected which had as holes, slots, groove that are considered complex parts in RE to reach a match between original and tradition parts after manufacturing.
Since its invention by the Ancient Romans and later developed during the mid-18th century, the concrete structure and finish, has been considered as the most powerful, practical, economic and constructional material that meets the building’s architectural and aesthetical requirements. By creating unique architectural forms, the pioneer architects used concrete widely to shape up their innovative designs and buildings.
The pre-mixed ultra-high performance concrete which manufactured by Lafarge.
The transparent concrete and cement that allow the light beams to pass through them, introduces remarkable well-lit architectural spaces within the same structural criteria. This product is a recyclable, sustainab
... Show MoreThe monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreThe sports field is one of the fields that are concerned with the various methods and methods because of their positive impact on the development of actual training, the investment of the exerted effort in time, and through the follow-up of the researcher in the field and academic field, I noticed that there is a weakness in explosive ability, which affects performance and skill level during training and competition Therefore, the researcher decided to prepare maximum physical exertion exercises according to the anaerobic threshold as a principle of development in many physical and skill variables because good physical performance leads to reaching the best achievements and since the skill of shooting by jumping high - either constitutes a
... Show MoreThe importance of the research is evident in the use of exercises with the training device, which is one of the modern techniques in teaching the abilities of players, especially in teaching the skill of the backhand, and in improving the accuracy of the performance of players and increasing the contribution to the formation of a base for the game for players who have a good level of learning and upgrading the game to reach a certain achievement, and the research issue was represented in the lack of accuracy in sending balls to the required areas to achieve points, especially in the performance of the skill of the backhand due to the speed of play during the course of the match, and the study aimed to introduce modern technology usi
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreEducation around the world has been negatively affected by the new coronavirus disease (COVID-19) pandemic. Many institutions had to transition to distance learning in compliance with the enforced safety measures. Distance learning might work well for settings with stable internet connections, professional technical teams, and basic implementation of technology in education. In contrast, distance learning faces serious challenges in less fortunate settings with inferior infrastructure. This report aims to shed light on the immediate action steps taken at a leading pharmacy school in Iraq to accommodate for the enforced changes in pharmacy education. The University of Baghdad College of Pharmacy went from less than minimal technology impl
... Show MoreThis dissertation studies the application of equivalence theory developed by Mona Baker in translating Persian to Arabic. Among various translation methodologies, Mona Baker’s bottom-up equivalency approach is unique in several ways. Baker’s translation approach is a multistep process. It starts with studying the smallest linguistic unit, “the word”, and then evolves above the level of words leading to the translation of the entire text. Equivalence at the word level, i.e., word for word method, is the core point of Baker’s approach.
This study evaluates the use of Baker’s approach in translation from Persian to Arabic, mainly because finding the correct equivalence is a major challenge in this translation. Additionall
... Show MoreAcute Respiratory Distress Syndrome (ARDS) causes up to 40% mortality in humans and is difficult to treat. ARDS is also one of the major triggers of mortality associated with coronavirus-induced disease (COVID-19). We used a mouse model of ARDS induced by Staphylococcal enterotoxin B (SEB), which triggers 100% mortality, to investigate the mechanisms through which Δ9-tetrahydrocannabinol (THC) attenuates ARDS. SEB was used to trigger ARDS in C3H mice. These mice were treated with THC and analyzed for survival, ARDS, cytokine storm, and metabolome. Additionally, cells isolated from the lungs were used to perform single-cell RNA sequencing and transcriptome analysis. A database analysis of human COVID-19 patients was also performed t
... Show MoreThe aim of this study is to construct a Mathematical model connecting the variation between the ambient temperatures and the level of consumption of kerosene in Iraq during the period (1985-1995), and use it to predict the level of this consumption during the years (2005-2015) based on the estimation of the ambient temperatures.
The main idea of this research is that the researcher believes that media research remains useless unless its goals and results are achieved by using the correct scientific tools. The researcher chooses 100 research papers of about 35% of the published ones, 10 of them are excluded because they are outside media. We use a simple and randomized sample including the three departments of media: journalism, television and radio journalism and public relations. The researcher adopts statistical methods such as Fay coefficient, correlation coefficient, Pearson correlation coefficient and straight line equation.
The researcher uses an analytical form followed by analysis of content, them the scale. The results are found in 58 researches, w