Preferred Language
Articles
/
alkej-197
Comparisons of Mechanical Properties of sub-mm Lead Based and Lead Free Based Solder Using in Manufacturing of Printed Circuits
...Show More Authors

Abstract

This study investigates the mechanical compression properties of tin-lead and lead-free alloy spherical balls, using more than 500 samples to identify statistical variability in the properties in each alloy. Isothermal aging was done to study and compare the aging effect on the microstructure and properties.

The results showed significant elastic and plastic anisotropy of tin phase in lead-free tin based solder and that was compared with simulation using a Crystal Plasticity Finite Element (CPEF) method that has the anisotropy of Sn installed. The results and experiments were in good agreement, indicating the range of values expected with anisotropic properties.

Keywords: Lead-free solder, composite solder, and aging.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Antioxidant and free radical scavenging effects of Iraqi sumac ( Rhus coriaria L)
...Show More Authors

This study was carried out to evaluate the antioxidant activity of Iraqi sumac seeds (Rhus coriaria. L) (Anacardiaceae). Total phenolic compounds and flavoniods were determined in three different sumac seed extracts (SSE) (aqueous,ethanolic and methanolic extract). For extraction Antioxidant activity of SSE were evaluated by various antioxidant assays, including total antioxidant capacity, reducing power,by using 1,1-diphenyl-2-picryl hydrazyl (DPPH) radical scavenging, nitric oxide scavenging, Hydroxyl radical scavenging, and metal ion chelating activities. These various antioxidant activities were compared with ascorbic acid as a standard antioxidant.The results showed that the three(SSE), contained large amounts of phenolic and flavonio

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Solid Properties on Axial Liquid Dispersion in Bubble Column
...Show More Authors

Experiments were conducted to study axial liquid dispersion coefficient in slurry bubble column of 0.15 m inside diameter and 1.6 m height using perforated plate gas distributor of 54 holes of a size equal to 1 mm diameter and with a 0.24 free area of holes to the cross sectional area of the column. The three phase system consists of air, water and PVC used as the solid phase. The effect of solid loading (0, 30 and 60 kg/m3) and solid diameter (0.7, 1.5 and 3 mm) on the axial liquid dispersion coefficient at different axial location (25, 50 and 75 cm) and superficial gas velocity covered homogeneous-heterogeneous flow regime (1-10 cm/s) were studied in the present work. The results show that the axial liquid dispersion coeffic

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Fabrication and Characterization of Tri Metal Oxides by Chemical Spray Pyrolysis Technique as a Gas Sensor
...Show More Authors

In this research tri metal oxides were fabricated by simple chemical spray pyrolysis technique from (Sn(NO3)2.20 H2O, Zn(NO3)2.6 H2O, Cd(NO3)2.4 H2O) salts at concentration 0.1M with mixing weight ratio 50:50 were fabricated on silicon substrate n-type (111). (with & without the presence of grooves by the following diemensions (20μm width, 7.5μm depth) with thickness was about ( 0.1 ±0.05 µm) using water soluble as precursors at a substrate temperature 550 ºC±5, with spray distance (15 cm) and their gas sensing properties toward H2S gas at different concentrations (10,50,100,500 ppmv) in air were investigated at room te

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
East Asian Journal On Applied Mathematics
Free Boundary Determination in Nonlinear Diffusion
...Show More Authors
Abstract<p>Free boundary problems with nonlinear diffusion occur in various applications, such as solidification over a mould with dissimilar nonlinear thermal properties and saturated or unsaturated absorption in the soil beneath a pond. In this article, we consider a novel inverse problem where a free boundary is determined from the mass/energy specification in a well-posed one-dimensional nonlinear diffusion problem, and a stability estimate is established. The problem is recast as a nonlinear least-squares minimisation problem, which is solved numerically using the <italic>lsqnonlin</italic> routine from the MATLAB toolbox. Accurate and stable numerical solutions are achieved. For noisy data, inst</p> ... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation for 3-DoF SCARA Robot based PLC
...Show More Authors

Abstract 

This paper presents mechanical and electrical design, and implementation  process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref