Preferred Language
Articles
/
joe-2687
Improving Press Bending Production Quality through Finite Element Simulation: Integration CAD and CAE Approach
...Show More Authors

Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290 standard guides this study. The software in this package may combine CAD (Computer-Aided Design) and CAE (Computer-Aided Engineering) without requiring extra design applications. This study tested SPCC and SPHC plate materials with five thickness variations. The findings embrace the number of failure risks associated with press bending exhibited on the von Mises stress diagram, which is directly proportional to showing the thickness limit of each material type throughout the bending process. The study's findings lay the groundwork for improving manufacturing quality by lowering the number of faulty goods produced by trial and error. Because the maximum allowable die width is 12 mm, the thickness limit of the press bending process is 2 mm. However, due to the greater intensity of the SPCC material, it has a reduced defect rate compared to SPHC material.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 26 2017
Journal Name
Journal Of Engineering
The Dynamic Behavior of Water Flowing Through Packed Bed of Different Particle Shapes and Sizes
...Show More Authors

An experimental study was conducted on pressure drop of water flow through vertical cylindrical packed beds in turbulent region and the influence of the operating parameters on its behavior. The bed packing was made of spherical and non-spherical particles (spheres, Rasching rings and intalox saddle) with aspect ratio range 3.46  D/dp  8.486 obtaining bed porosities 0.396 0.84 and Reynolds number 1217  21758. The system is consisted of 5 cm inside diameter Perspex column, 50 cm long; distilled water was pumped through the bed with flow rate 875, 1000, 1125, 1250,1375 and 1500 l/h and inlet water temperature 20, 30, 40 and 50 ˚C. The packed bed system was monitored by using LabVIEW program, were the result

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
Comparative biosimilar quality studies between a rituximab product and MabThera
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Oct 24 2018
Journal Name
Journal Of Economics And Administrative Sciences
Factors Strategic Choice and Impact at Quality of Higher Education
...Show More Authors

This research raised the strategic selection factors and dimensions of the quality of higher education and what the nature of their relationship and has been collecting a sample search from the technological University of president scientific departments and administrative and scientific associates and chiefs of branches This research aims at studying factors affecting the strategic selection effects these factors in the quality of higher education and the combination of these factors has been identified as a group of selected dimensions of quality of higher education and study link relationships and affecting factors and strategic selection of (risk, previous strategies, resources, time, considerations and internal trends) and d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 29 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications (ijnaa)
Applying a suitable approximate-simulation technique of an epidemic model with random parameters
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
The jurisprudence of Imam Yahya bin Moin through his history
...Show More Authors

Jurisprudential rulings were not once restricted to anyone. Even if some prominent imams were famous in one science, this does not mean that some of them were not very knowledgeable and well versed in another science, but he did not know much about it, given his fame in the first science in which he emerged. It prevailed over him until he became known only through him, and there are a large number of these people, and among them is our imam, the great critic Yahya bin Ma’in, may God be pleased with him. Many people, and even scholars, know about him except that he is the only imam in jarh and ta’deel, and on his words and the words of his strike are relied upon. In terms of the authenticity and weakness of the hadith, he is in this f

... Show More
View Publication Preview PDF