The parameters of resistance spot welding (RSW) performed on low strength commercial aluminum sheets are investigated experimentally, the performance requirements and weldability issues were driven the choice of a specific aluminum alloy that was AA1050. RSW aluminum alloys has a major problem of inconsistent quality from weld to weld comparing with welding steel
alloys sheet, due to the higher thermal conductivity, higher thermal expansion, narrow plastic temperature range, and lower electrical resistivity. Much effort has been devoted to the study of describing the relation between the parameters of the process (welding current, welding time, and electrode force) and weld strength. Shear-tensile strength tests were performed to ind
Reprehensible during the period of human life ,particular in child hood and after weaning
baby,analmeating habits have acquired his remaining life time and here high Iights,the role of
the mother in the childs education,dietar habits, and health methods and what is beneficial to
his health and in sufficien quantities for the baby .brooze trails are learned by the childin the
home with animportant and significant role in the future,inacht.aaralgame course wisely,after
becoming more in dependent in its delision-making an choices beyond the control of parents.
The present study aimed to message measure the awareness of food the mother and her role in
the development of food awareness sons, and its relation ship with som
The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show MoreThe Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
Increased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo
... Show MoreArtificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose
... Show More
In any natural area or water body, evapotranspiration is one of the main outcomes in the water balance equation. It is also a crucial component of the hydrologic cycle and considers as the main requirement in the planning and designing of any irrigation project. The climatic parameters for the Ishaqi area are calculated from the available date of Samarra and Al-Khlais meteorological stations according to a method for the period (1982–2017) according to Fetter method. The results of the mean of rainfall, relative humidity temperature, evaporation, sunshine, and wind speed of the Ishaqi area are 171.96 mm, 49.67%, 24.86 C°, 1733.61 mm, 8.34 h/day, and 2.3 m/sec, respectively. Values of Potential Evapotranspiration are determined by
... Show MoreResource estimation is an essential part of reservoir evaluation and development planning which highly affects the decision-making process. The available conventional logs for 30 wells in Nasiriyah oilfield were used in this study to model the petrophysical properties of the reservoir and produce a 3D static geological reservoir model that mimics petrophysical properties distribution to estimate the stock tank oil originally in place (STOOIP) for Mishrif reservoir by volumetric method. Computer processed porosity and water saturation and a structural 2D map were utilized to construct the model which was discretized by 537840 grid blocks. These properties were distributed in 3D Space using sequential Gaussian simulation and the variation in
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More