Preferred Language
Articles
/
joe-1855
Material Selection for Unmanned Aerial Vehicles (UAVs) Wings Using Ashby Indices Integrated with Grey Relation Analysis Approach Based on Weighted Entropy for Ranking
...Show More Authors

The designer must find the optimum match between the object's technical and economic needs and the performance and production requirements of the various material options when choosing material for an engineering application. This study proposes an integrated (hybrid) strategy for selecting the optimal material for an engineering design depending on design requirements. The primary objective is to determine the best candidate material for the drone wings based on Ashby's performance indices and then rank the result using a grey relational technique with the entropy weight method. Aluminum alloys, titanium alloys, composites, and wood have been suggested as suitable materials for manufacturing drone wings. The requirements for designing a drone's wings are to make them as light as possible while meeting the stiffness, strength, and fracture toughness criteria. The conclusion indicates that Carbon Fiber-Reinforced Polymer (CFRP) is the best material for producing drone wings. In contrast, wood and aluminum alloys were the cheapest materials when the design had to be inexpensive.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Physical Education
Leadership Behaviour and Its Relation With Active Communication Skills Of Soccer Coaches
...Show More Authors

View Publication
Publication Date
Sat Oct 12 2019
Journal Name
Journal Of The College Of Education For Women
Uncompleted Personality and it’s relation with Some Variables of the University Students
...Show More Authors

Uncompleted Personality and it’s relation with Some Variables of the University Students

View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Self Protection and it's Relation with the social ignorance OF UNIVERSITY STUDENTS
...Show More Authors

The aim of this research is to find a relation between self-protection and the social - ignorance of the univresity students. In applying the aims of the reaearch, the ressearcher has constructed two scales to measure
self - protection and the social - ignorance. After finding their validity and stability and their discriminative power, the researcher has applied them on a sample of (200) male and female. University students, who were selected randomly. The results of the research has arrived at finding a positive relation between self-protection and social - ignorance.

The researcher has recommended a concentration on the role of parents in raising their childern depending on themselves and making f

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 21 2026
Journal Name
Al-rafidain University College For Sciences
“Simple Regression Analysis by using Linear Programming Technique and illustration of Absolute Residuals method with another Estimation Techniques”
...Show More Authors

This research deals with unusual approach for analyzing the Simple Linear Regression via Linear Programming by Two - phase method, which is known in Operations Research: “O.R.”. The estimation here is found by solving optimization problem when adding artificial variables: Ri. Another method to analyze the Simple Linear Regression is introduced in this research, where the conditional Median of (y) was taken under consideration by minimizing the Sum of Absolute Residuals instead of finding the conditional Mean of (y) which depends on minimizing the Sum of Squared Residuals, that is called: “Median Regression”. Also, an Iterative Reweighted Least Squared based on the Absolute Residuals as weights is performed here as another method to

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Estimation of Salivary IL-6 Level in relation of Periodontal Status in Patients with Hyperthyroidism
...Show More Authors

Background: The overproduction of thyroid hormones is known as hyperthyroidism. Increased susceptibility to caries and periodontal disease are two potential oral symptoms. The interleukin-6 (IL-6) was observed to significantly increased in the hyperthyroid group. According to multiple research, IL-6 dysregulation has been linked to a number of oral disorders, including periodontal diseases. The study aimed to evaluate periodontal health status in relation to IL6 among hyperthyroidism patients.

Subjects and Methods: The sample was composed of 90 female patients aged 25-45 years attending endocrine disorder

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Numerical Approach of Linear Volterra Integro-Differential Equations Using Generalized Spline Functions
...Show More Authors

This paper is dealing with non-polynomial spline functions "generalized spline" to find the approximate solution of linear Volterra integro-differential equations of the second kind and extension of this work to solve system of linear Volterra integro-differential equations. The performance of generalized spline functions are illustrated in test examples

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Water Resource And Protection
Evaluating Water Stability Indices from Water Treatment Plants in Baghdad City
...Show More Authors

View Publication
Crossref (36)
Crossref
Publication Date
Fri Nov 29 2024
Journal Name
The Iraqi Geological Journal
Data Driven Approach for Predicting Pore Pressure of Oil and Gas Wells, Case Study of Iraq Southern Oilfields
...Show More Authors

Precise forecasting of pore pressures is crucial for efficiently planning and drilling oil and gas wells. It reduces expenses and saves time while preventing drilling complications. Since direct measurement of pore pressure in wellbores is costly and time-intensive, the ability to estimate it using empirical or machine learning models is beneficial. The present study aims to predict pore pressure using artificial neural network. The building and testing of artificial neural network are based on the data from five oil fields and several formations. The artificial neural network model is built using a measured dataset consisting of 77 data points of Pore pressure obtained from the modular formation dynamics tester. The input variables

... Show More
View Publication
Scopus Crossref