Friction stir welding (FSW) of Tee-joints is obtained by inserting a specially designed rotating pin into the clamped blanks, through top plate (skin) to bottom plate (stringer), and then moving it along the joint, limiting the contact between the tool shoulder and the skin. The present work aims to investigate the defects occur for Tee-joint of an Aluminum alloy (Al 5456) with dimensions (180mm x 70mm) for the skin plate, (180mm x 30mm) for stringer plate and thickness of (4mm).
The effects of welding parameters such as rotational speed, linear speed, plunging depth, tool tilting, and die radii of welding fixture on the welding quality of Aluminum Alloy will be studied. Weld defects had been summarized and studied, and then the best conditions that led to good welds had been estimated.
Background: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (o
... Show MoreThe research aims to verify the presence of correlation between the financial cycle and the economic cycle in the Iraqi economy. During the research period, the Iraqi economy witnessed a crisis cycle due to the permanent deviations in the state budget and the occurrence of sustainable deficits during the period of the economic blockade with the coincidence of an inflationary economic cycle due to the cheap money policy and the occurrence of Negative supply shocks due to the blockade and the madly high general level of prices, in addition to the weak financial planning of the state budget during the post-economic blockade and the entry of the economy into a stagnant economic cycle due to security and political instability, low levels of priv
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators