Preferred Language
Articles
/
kxcNWJIBVTCNdQwCk6yo
Nondestructive Evaluation of Fiber-Reinforced Polymer Using Microwave Techniques: A Review
...Show More Authors

Carbon-fiber-reinforced polymer (CFRP) is widely acknowledged as a leading advanced material structure, offering superior properties compared to traditional materials, and has found diverse applications in several industrial sectors, such as that of automobiles, aircrafts, and power plants. However, the production of CFRP composites is prone to fabrication problems, leading to structural defects arising from cycling and aging processes. Identifying these defects at an early stage is crucial to prevent service issues that could result in catastrophic failures. Hence, routine inspection and maintenance are crucial to prevent system collapse. To achieve this objective, conventional nondestructive testing (NDT) methods are utilized to inspect CFRP components. However, the restricted field penetration within the CFRP makes conventional NDT approaches ineffective. Recently, microwave techniques have been developed to address the challenges associated with CFRP inspection by providing better material penetration and more precise results. This paper offers a review of the primary NDT methods employed to inspect CFRP composites, emphasizing microwave-based NDT techniques and their key features.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 08 2025
Journal Name
Engineering, Technology & Applied Science Research
Multi-Layer Feedforward Neural Network Modelling of a Kinematics Solution of A 3-DoF Manipulator Robot
...Show More Authors

Modeling forward kinematics with neural networks allows for efficient handling of nonlinear relationships and realistic error correction in time-critical applications by relying on accurate training data. This paper presents a Multi-Layer Feed-Forward Neural Network (MLFFNN) to solve the forward kinematics of a 3-DOF robot. The proposed MLFFNN consists of 50 hidden neurons and was trained using 628319 samples to find only the position (x, y, z) of the end-effector. Data were generated by MATLAB, assuming an incremental motion of joints. The joint variables ( , , and ) are the inputs of the NN, which outputs the positions of the end effector (x, y, z) calculated using the Denavit-Hartenberg (DH) method. The results demonstrate that t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Plant Archives
Schistosomiasis vector control using cucumis melo plantextractswithbioassayexperiment
...Show More Authors

he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail

... Show More
View Publication
Scopus
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Mon Nov 01 2021
Journal Name
University Of Baghdad, College Of Education For Pure Sciences \ Ibn Al-haitham, Department Of Mathematics
SOME ALPHA-TOPOLOGICAL CONCEPTS USING GRAPH THEORY
...Show More Authors

This dissertation depends on study of the topological structure in graph theory as well as introduce some concerning concepts, and generalization them into new topological spaces constructed using elements of graph. Thus, it is required presenting some theorems, propositions, and corollaries that are available in resources and proof which are not available. Moreover, studying some relationships between many concepts and examining their equivalence property like locally connectedness, convexity, intervals, and compactness. In addition, introducing the concepts of weaker separation axioms in α-topological spaces than the standard once like, α-feebly Hausdorff, α-feebly regular, and α-feebly normal and studying their properties. Furthermor

... Show More
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dye Removal from Wastewater Using Iron Salts
...Show More Authors

This investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Genetic--Based Face Retrieval Using Statistical Features
...Show More Authors

Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Modern Trends In Engineering And Research
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors