Preferred Language
Articles
/
alkej-545
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.                                                                                                     

      A three dimensional (3-D) model has been constructed to study the temperature distribution and the depth or penetration of the weld spot. The results showed that the weld zone and heat affected zone (HAZ) suffer from high temperature variation caused by severe thermal cycle. The temperature reaches the highest value of the melt metal at the weld spot 698°C at weld current 130 Amp, weld time 6 sec and arc length 1.6 mm, then drops further away from the weld spot in the direction  the base metal.

      Figuers were plotted to explain the results and to show the temperature distribution and its value in the weld spot  and heat effected zone.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 21 2017
Journal Name
Lecture Notes In Computer Science
Emotion Recognition in Text Using PPM
...Show More Authors

In this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Using LiF Disc in Thermoluminescence Dosimetry
...Show More Authors

A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.

View Publication Preview PDF
Crossref
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Using the Input - Output Model in building the economic plan using the computer
...Show More Authors

The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Biochem. Cell. Arch.
External morphology study of female genus Hauptidia Dworaowska, 1970 of sub-family typhlocybinae Kirschbaum, 1868, order hemiptera collected from Al-Kafal area in Babylon, Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Mar 04 2026
Journal Name
Modern Sport
Job commitment and its relation to the behavior of citizenship in physical education teachers Directorate of Education Baghdad AL- Karkh THird Search submitted by Research
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Nov 30 2018
Journal Name
Civil Engineering Journal
Determining the Causes of Punching Shear in Reinforced Slabs Using Fishbone Diagram
...Show More Authors

Risk identification and assessment can be analysed using many risk management tools. Fishbone diagram is one of these techniques which can be employed, for the identification of the causes behind the construction failure, which   has become a phenomenon that often gets repeated in several projects. If these failures are not understood and handled scientifically, it may lead to disputes between the project parties. Additionally, the construction failure also leads to an increase in the project budget, which in turn causes a delay in the completion of the projects. Punching shear in reinforcement slab may be one of the reasons for construction failures. However, there are many doubts about other causes that lead to this failure as w

... Show More
Crossref (3)
Clarivate Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Corrosion Inhibition of Low Carbon Steel in Sulfuric Acid Using Polyvinyl Alcohol
...Show More Authors

The inhibitive power of Polyvinyl Alcohol (PVA) was investigated toward the corrosion of carbon steel in 0.2N H2SO4 solution in the temperature range of 30-60˚C and PVA concentration range of 150-2000 ppm.

   The corrosion rate was measured using both the weight loss and the electrochemical techniques. The weight loss results showed that PVA could serve as a corrosion inhibitor but its inhibition power was found to be low for the corrosion of carbon steel in the acidic media. Electrochemical analysis of the corrosion process of carbon steel in an electrochemical corrosion cell was investigated using 3-Electrode corrosion cell. Polarization technique was used for carbon steel corrosion in 0.2N H

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment of Composite Nanoleakage Using Various Dentine Surface Treatments
...Show More Authors

Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Minimization of Toxic Ions in Waste Water Using Emulsion Liquid Membrane Technique
...Show More Authors

In the present study, the removal of zinc from synthetic waste water using emulsion liquid membrane extraction technique was investigated. Synthetic surfactant solution is used as the emulsifying agent. Diphenylthiocarbazon (ditizone) was used as the extracting agent dissolved in carbon tetrachloride as the organic solvent and sulfuric acid is used as the stripping agent. The parameters that influence the extraction percentage of Zn+2 were studied. These are the ratio of volume of organic solvent to volume of aqueous feed (0.5-4), ratio of volume of surfactant solution to volume of aqueous feed (0.2-1.6), pH of the aqueous feed solution (5-10), mixing intensity (100-1000) rpm, concentration of extracting agent (20-400) ppm, surfactant co

... Show More
View Publication Preview PDF