Preferred Language
Articles
/
alkej-209
Thermal Field Analysis of Oblique Machining Process with Infrared Image for AA6063-T6
...Show More Authors

Abstract

 Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it is found that the mean tool rake face temperature distribution decreases with increase of tool obliquity. The result also show that the maximum error between the predicted and measured temperatures by IR camera was between 6-27 °C.

Keywords: Infrared, Deform-3D, tool obliquity, turning.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Preparation and Study Hardness and Thermal Conductivity (Tc) to Polyester Resin Composite with (Titanium Dioxide, Zinc Oxide, Acrylonitril, Wood Flour Coconut
...Show More Authors

This study is attempt to improve thermal isolation through measuring thermal conductivity composite of on polyester resin with fillers of (TiO2, ZnO, Acrylonitril, wood flour Coconut (Wf). The grain size of the fillers is 200 µm. The number of samples is (16) in addition to the virgin sample; these samples are prepared by cast molding method for polyester with filler volume fractions (5%, 10%, 15% and 20%). Shore hardness tests were used to measure the hardness and Lee disk method for thermal conductivity. The experimental results showed that the (20% ZnO) sample has the maximum value of thermal conductivity where (20% w.f) has minimum thermal conductivity .on the other hand (15% ZnO) sample give the maximum value of hardness where (20% w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
An An Accurate Estimation of Shear Wave Velocity Using Well Logging Data for Khasib Carbonate Reservoir - Amara Oil Field
...Show More Authors

   

Shear and compressional wave velocities, coupled with other petrophysical data, are vital in determining the dynamic modules magnitude in geomechanical studies and hydrocarbon reservoir characterization. But, due to field practices and high running cost, shear wave velocity may not available in all wells. In this paper, a statistical multivariate regression method is presented to predict the shear wave velocity for Khasib formation - Amara oil fields located in South- East of Iraq using well log compressional wave velocity, neutron porosity and density. The accuracy of the proposed correlation have been compared to other correlations. The results show that, the presented model provides accurate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 11 2025
Journal Name
Al–bahith Al–a'alami
Petra University’s Students’ Uses For SMS Messages and its Verifications (A Field Study on Students of Petra University’s Colleges)
...Show More Authors

This study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.

The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Histological variety analysis for pleomorphic adenoma in salivary glands: Retrospective study
...Show More Authors

Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Macromolecular Characterization Of Hydrocarbons For Sustainable Future
Feasibility of the Gas and Downhole Water Sink-Assisted Gravity Drainage (GDWS-AGD) Process to Enhance the Recovery of Oil in Reservoirs with Strong Aquifer
...Show More Authors

Gas and Downhole Water Sink, Gravity Drainage, GDWS-AGD, Enhance the Recovery of Oil

Crossref (2)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Obstacles to development in the field of education
...Show More Authors

Education is the most powerful and important weapon in fighting poverty and unemployment because it provides students with new skills that appropriate the new market requirements and fair distribution of natural resources. It also transfers knowledge, skills, and ethics over generations. Education aims to create effective leaders who go under training and rehabilitation process, create a new human and instill faith, generate the creativity and innovation, and keep abreast with scientific process, updating curriculum, and finally, applying the technical education

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Permeability Determination of Tertiary Reservoir/Ajeel Oil Field
...Show More Authors

This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be

... Show More
View Publication Preview PDF
Crossref (3)
Crossref