Preferred Language
Articles
/
joe-171
Optimization of Surface Roughness for Al-alloy in Electro-chemical Machining (ECM) using Taguchi Method
...Show More Authors

Electro-chemical Machining is  significant  process to remove metal with using  anodic dissolution. Electro-chemical machining use to removed metal workpiece from (7025) aluminum alloy using Potassium chloride (KCl) solution .The tool used was made from copper. In this present the optimize processes input parameter use are( current, gap and electrolyte concentration) and surface roughness (Ra) as output .The experiments on electro-chemical machining with use current (30, 50, 70)A, gap (1.00, 1.25, 1.50) mm and electrolyte concentration (100, 200, 300) (g/L).  The method (ANOVA) was used to limited the large influence factors affected on surface roughness and found the current was the large influence factors  with (72.17%) . The results of the optimization of comparison of experimental and prediction conditions current at level-1(30 A) , gap at level-1 (1.00mm ) and electrolyte concentration at level-1(100(g/L)) shown the average experiments and prediction surface roughness (1.352) and (1.399) respectively..

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 18 2025
Journal Name
Sustainable Engineering And Innovation
Using fruit fly and dragonfly optimization algorithms to estimate the Fama-MacBeth model
...Show More Authors

This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Sep 02 2017
Journal Name
Studies In History And Archaeology
Chemical industries in Tlemcen in the Islamic Middle Ages
...Show More Authors

Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Pure And Applied Microbiology
Mixture Design of Experiments for the Optimization of Carbon Source for Promoting Undecylprodigiosin and Actinorhodin Production
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 18 2020
Journal Name
Egyptian Journal Of Chemistry
Corrosion Protection of Pure Titanium Implant in Artificial Saliva by Electro-Polymerization of Poly Eugenol
...Show More Authors

IN this work, a titanium dental implant was modified by electro-polymerized of 4-allyl-2-methoxyphenol (Eugenol) using direct current lower than 3.5 volt. The modification of titanium dental implant was achieved to improve its corrosion resistant. Fourier transform infrared spectroscopy (FTIR) was employed to confirm the electro-polymerization of Eugenol to Poly Eugenol (PE) on pure titanium. Deposition of PE on titanium was confirmed by X-ray diffraction and was characterized by thermogravimetric analysis (TGA). The surface morphology of polymeric film were examined through scanning electron microscopy (SEM). Coated titanium by (PE) revealed a good corrosion protection efficiency even at temperature ranged (293-323)K in artificial saliva.

... Show More
View Publication
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Chemical Synthesis and Characterization of Conducting Polyaniline
...Show More Authors

     The polyaniline powder was chemically manufactured by direct oxidation of aniline. The resulting polymer was characterized by the results of optical, measurements by (FT-IR) spectroscopy, we have detected some of the absorption peaks located at 3498, 2858 cm-1, which correspond N-H vibrations, and C-H expansion of the aromatic ring respectively as well as stretching vibrations of quinoid ring have been observed. Structural properties, such as the surface topography using an atomic force microscope (AFM), and Surface composition by (SEM) have been studied. The structure of some pellets of polyaniline powder have been examined by using analytical X-ray diffraction technique, the pattern of obse

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Al-arbaeen Al-boldniy for Ibin Asker Historical Study
...Show More Authors

Fortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Financing Cost Optimization in Construction Sector: A Review
...Show More Authors

The main aim of this research is to introduce financing cost optimization and different financing alternatives. There are many studies about financing cost optimization. All previous studies considering the cost of financing have many shortcomings, some considered only one source of financing as a credit line without taking into account different financing alternatives. Having only one funding alternative powers, restricts contractors and leads to a very specific financing model. Although it is beneficial for the contractor to use a long-term loan to minimize interest charges and prevent a substantial withdrawal from his credit line, none of the existing financial-based planning models have considered long-term loans in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Molding and simulation sedimentation process using finite difference method
...Show More Authors
Abstract<p>The goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed</p> ... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More