Preferred Language
Articles
/
alkej-321
Prediction of Surface Roughness and Material Removal Rate in Electrochemical Machining Using Taguchi Method
...Show More Authors

Electrochemical machining is one of the widely used non-conventional machining processes to machine complex and difficult shapes for electrically conducting materials, such as super alloys, Ti-alloys, alloy steel, tool steel and stainless steel.  Use of optimal ECM process conditions can significantly reduce the ECM operating, tooling, and maintenance cost and can produce components with higher accuracy. This paper studies the effect of process parameters on surface roughness (Ra) and material removal rate (MRR), and the optimization of process conditions in ECM. Experiments were conducted based on Taguchi’s L9 orthogonal array (OA) with three process parameters viz. current, electrolyte concentration, and inter-electrode gap. Signal-to-noise (S/N), the analysis of variance (ANOVA) was employed to find the optimal levels and to analyze the effect of electrochemical machining parameters on Ra and MRR. The surface roughness of the workpiece was decreased with the increase in current values and electrolyte concentration while causing an increase in material removal rate. The ability of the independent values to predict the dependent values (R2) were 87.5% and 96.3% for mean surface roughness and material removal rate, respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 02 2025
Journal Name
International Journal Of Biology And Chemistry
Preparation and Characterization of Nano-Iron Oxide by using Iraqi Orange Plant Extract and Testing for Adsorption Efficiency
...Show More Authors

Nanomaterials, including nanoparticles such as iron oxide nanoparticles, have received great attention from researchers due to their unique properties and applications. There are several diverse methods, including chemical, physical, and green biological methods, to prepare iron oxide nanoparticles. The green method was chosen because it is safer, purer, and less toxic compared to other methods. Therefore, the green method is a promising and environmentally friendly method in the near future. The aqueous extract of Iraqi orange leaves was used to prepare nano iron oxide, it was examined structurally and spectrally by several techniques (X-ray diffraction- XRD, Fourier transform infrared - FT-IR, field emission scanning electron micr

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Chinese Journal Of Analytical Chemistry
Synthesis, characterization, antioxidant and bioactivity assessment, and thermodynamic analysis of metal ion complexes using a novel azo dye
...Show More Authors

In this study, the new azo dye,5,5-[1,2-phenylenebis(2,1-biazenediyl)] bis[8-quinolino], was used to synthesize complexes with Co2+, Ni2+, Cu2+, Zn2+, and Cd2+ ions. The compounds were characterized using 1H and 13C nuclear magnetic resonance (NMR) spectroscopy, Fourier transform infrared (FT-IR) spectroscopy, ultraviolet-visible (UV-Vis) spectroscopy, mass spectrometry, thermo gravimetric analysis (TGA), diffevential scanning calovimltry (DSC), CHN analysis. Further, conductivity, magnetic susceptibility, and metal and chlorine content analysis using FT-IR spectroscopy revealed that the ligand chelates as a bidentate (OH) phenol group and a bidentate (C=N) ring group. The ligand exhibited tetradentate behavior, forming tetrahedral complexe

... Show More
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Russian Journal Of Bioorganic Chemistry
Synthesis and Characterization of New 1,3,4-Oxadiazole Ring on Creatinine Derivatives Using Iodine and Study Their Anticancer Effect
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 06 2014
Journal Name
Arabian Journal Of Geosciences
Mineralogy texture and chemistry of the Ellicott meteorite using scanning electron microscope and energy disperse spectroscopy (SEM/EDS)
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Euphrates Journal Of Agricultural Science 7 (4)‏
Recognize the Sex of date palm Using Randomly Amplified Polymorphic DNA (RAPD) and some Traditional and Chemical Methods‏
...Show More Authors

Publication Date
Wed Oct 01 2025
Journal Name
Chinese Journal Of Analytical Chemistry
Synthesis, characterization, antioxidant and bioactivity assessment, and thermodynamic analysis of metal ion complexes using a novel azo dye
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
The Reality of Using Electronic Applications in Teaching Language Skills to People with Mild Intellectual Disability from the Mothers’ Perspective
...Show More Authors

Abstract

This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref