Table of content

Engineering and Technology Journal

مجلة الهندسة والتكنولوجيا

ISSN: 16816900 24120758
Publisher: University of Technology
Faculty: Presidency of the university or centers
Language: Arabic and English

This journal is Open Access

About

The Journal aims to disseminate knowledge in the fields of Engineering, Technology and Sciences .All the researches will submit to the scientific evaluation procedures of publishing and documentation. The journal under takes only the publishing of the new researches that had not been published previously on other journals or debated in conferences.

The Instructions of Submitting The Research to Scientific Evaluation:
a- The research should be Submitted in 4 copies in Arabic or English Languages, auther's name should be eliminated from 2 copies only. The abstract should be typed on the front page not exceeding (150 words) in both Arabic and English on size (A4) sheet. Pages should be numbered and not more than (15) page.
b- The researcher should fill a declaration form which states that he doesn't publish the research during the evaluation period. He must give his full address phone number and e-mail.

Firstly- The author should pay a fee of (ID55000) when he submits the research and a fee of (ID55000) when the research is accepted .These fees are obligatory for all. The sum cannot be reimbursed in any case.
Secondly- The annual subscription in the journal inside Iraq is ID250000) Iraqi dinar, and outside Iraq is (us $250) abroad.
____________________________________________
____________________________________________
Engineering and Technology Journal
Publication Ethics
The publication of science and technology include thorough, methodical and complete processes by publishers and editors which have to be handled efficiently and proficiently. To sustain high ethical values of publication, publishers attempt to work intimately at all times with editors, authors, and peer-reviewers. The ethics statement for the Engineering & Technology Journal is based on those issued by the Committee on Publication Ethics (COPE) Code of Conduct guidelines available at www.publicationethics.org. The basic publishing ethics involved in the publishing process can be summarized as follows:

Reviewers’ Responsibilities
The responsibilities of the reviewers can be identified as:
• To provide a detailed, effective, and unbiased evaluation in promptly on the scientific content of the work.
• To indicate whether the writing is relevant, brief and clear and evaluating the originality and scientific accuracy of the submitted paper.
• To maintain the confidentiality of the complete review process.
• To inform the journal editor about any financial or personal conflict of interest and reject to review the manuscript when a possibility of such a conflict exists.
• To inform the journal editor of any ethical concerns in their evaluation of submitted manuscripts; such as any violation of ethical treatment of animal or human subjects or any considerable similarity between the previously published article and any reviewed manuscript.

Authors’ Responsibilities
The responsibilities of the authors can be described as:
• To assure that all the work reported in the manuscript must be original and free from any plagiarism.
• To make confident that the submitted work should not have been published elsewhere or submitted to any other journal(s) at the same time.
• To explicitly acknowledge any potential conflict of interest.
• The author(s) must give proper acknowledgments to other work reported (individual/company/institution). Permission must be obtained from any content used from other sources.
• It is important to note that only those who have made any substantial contribution to the interpretation or composition of the submitted work should be listed as ‘Authors’. On the other hand, other contributors should be mentioned as ‘co-authors’.

Publishers’ Responsibilities
The responsibilities of the Engineering & Technology Journal can be defined as:
• Engineering & Technology Journal is committed to working with journal editors, defining clearly their relevant roles, in order to ensure appropriate decisions regarding publication procedures and maintaining the transparency of editorial decisions.
• Engineering & Technology Journal guarantees the integrity autonomy and originality of each published article concerning:
o publication and research funding
o publication ethics and integrity
o conflicts of interest
o confidentiality
o authorship
o article modifications
o timely release of content.
____________________________________________
____________________________________________

ENGINEERING AND TECHNOLOGY JOURNAL
Scientific Refereed Journal Issued by University of Technology, IRAQ
COPYRIGHT AGREEMENT

The following assignment of copyright, executed and signed by the Author, is required with each manuscript submission. If the article is a “work made for hire”, the employer must sign it. The Author warrants that he/she has full power to make this agreement on behalf of himself and all his co-authors.
To the extent transferable, copyright in and of the undersigned, Author’s article titled:
************************************************************************by: *************************************************Reference ID: ******* submitted to the Engineering and Technology Journal is hereby assigned for publication.
In consideration of the acceptance of the Article for publication, the Author assigns to the Journal with full title guarantee, all copyrights, rights in the nature of copyright, and all other intellectual property rights in the Article throughout the world (present and future, and including all renewals, extensions, revivals, restorations and accrued rights of action).
The Author represents that he is the author and proprietor of this Article and that this Article has not heretofore been published in any form. The Author warrants that he has obtained written permission and paid all fees for use of any literary or illustration material for which rights are held by others. The Author agrees to hold the Editor(s)/Publisher harmless against any suit, demand, claim or recovery, finally sustained, by reason of any violation of proprietary right or copyright, or any unlawful matter contained in this article:



Signature: Date:
Name of Author:
Institution or Company:

Loading...
Contact info

جمهورية العراق –بغداد
الجامعة التكنولوجية- مجلة الهندسة والتكنولوجيا- ص.ب. 35010
Email: etj@uotechnology.edu.iq
____________________________________________
Journal website:
http://uotechnology.edu.iq/tec_magaz/EN/index.htm
____________________________________________
Republic of Iraq, Baghdad
University of Technology, Engineering & Technology Journal.
P.O.Box.35010
Email: etj@uotechnology.edu.iq

Email: uot_magaz@yahoo.com
__________________________________________
__________________________________________

Google Scholar Citations:
________________________
https://scholar.google.com/citations?user=w1aCAoMAAAAJ&hl=en

Table of content: 2019 volume:37 issue:5part (A) Engineering

Article
Controlling the Q-Point in Distributed Feedback Lasers Using a Numerical Optimization Methodology

Authors: Hisham K. Hisham
Pages: 148-156
Loading...
Loading...
Abstract

In this paper, a new methodology for controlling the Q-point in the distributed feedback (DFB) lasers is proposed. The method based on reducing the DFB transient period (TP) by optimizing laser’s model parameters numerically. The analysis has taken into account investigated the effects of the laser injection current (Iinj), the dc-bias level (Ibias), the temperature (T) variation, and the gain compression factor (ε). Results showed that by optimizing the value of Iinj, Ibias, T and ε; the Q-point could be controlled effectively. Where increasing the current ratio (i.e., Iinj/Ith) leads to reduce the TP value. In addition, by increasing Iinj and/or Ibias, the relaxation oscillation period (TRO) and the laser delay time (TDelay) are reduced significantly. From the other hand, the temperature varying may push the DFB laser to operate in an improper region through increasing the TP value; which may lead it to operate in the off-mode. Moreover, as ε is increased, the sinusoidal oscillations are dramatically damped results in a reduction in the TRO value and larger period of stabilized.


Article
Removal Oil from Produced Water by Using Adsorption Method with Adsorbent a Papyrus Reeds

Loading...
Loading...
Abstract

A papyrus reed, as a type of unusable farming waste, was used as kind of low-cost biosorbent for elimination a crude oil from the produced water that was produced in an Al-Ahdab field, Iraq, in a batch stirred operation mode. Fourier transform infrared spectroscopy (FTIR) and scanning electron microscope (SEM) were used to characterize the biosorbent before and after adsorption. Batch tests were employed as a function of the contact time, adsorbent dose, and the pH of the solution. The experimental results show that increases the amount adsorbent dosage, pH and contact times, the removal efficiencies were increases and optimum condition was obtained at pH value equal to 9, 5000 ppm adsorbent dose and 45 minutes contact time for removal about 94.5% of crude oil, for test sample initial crude oil concentration 257.06 ppm. Therefore, it can be disposed of without environmental damage. The better fitting for equilibrium sorption process data were satisfactorily by the Freundlich isotherm model with (R2= 0.9665) and the adsorption kinetics best described by a pseudo-second-order kinetic model.


Article
Lung Cancer Detection from X-ray images by combined Backpropagation Neural Network and PCA

Authors: Israa S. Abed
Pages: 166-171
Loading...
Loading...
Abstract

The lungs are portion of a complex unit, enlarging and relaxing numerus times every day to supply oxygen and exude CO2. Lung disease might occur from troubles in any part of it. Carcinoma often called Cancer is the generally rising and it is the most harmful disease happened in humankind. Carcinoma occurs because of uncontrolled growth of malignant cells inside the tissues of the lungs. Earlier diagnosis of cancer can help save large numbers of lives, while any delay or fail in detection may cause additional serious problems leading to sudden fatal death. The objective of this study is to design an automated system with an ability to improve the detection process in order to perform advanced recognition of the disease. The diagnosis techniques include: X-rays, MRI, CT images etc. X-ray is the common and low-cost technique that is widely used and it is relatively available for everyone. Rather than new techniques like CT and MRI, X-ray is human dependable, meaning it needs a Doctor and X-ray specialist in order to determine lung cases, so developing a system which can enhance and aid in diagnosis, can help specialist to determine cases in easily


Article
A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment

Authors: Maytham Azhar --- Amin H. Seno
Pages: 172-180
Loading...
Loading...
Abstract

In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized in medical and everyday environments. With the promise of IoT's proactive systems, the integration of smart things into standard Internet creates several security challenges, because most Internet technologies, communication protocols and sensors are not designed to support IoT. Recent research studies have shown that launching security / privacy attacks against IoT active systems, in particular, Wearable Medical Sensor (WMS) systems, may lead to catastrophic situations and life-threatening conditions. Therefore, security threats and privacy concerns in the IoT area should be actively studied. This causes us in this paper to create a privacy authentication protocol for IoT end-devices on a fourlayer structure that does not have the ability to accurately identify the device of request's sender so that some attacks can be minimized. We used the Blakley Sharing scheme to design a key generation and distribution system for secure communications between edge devices and end devices and examined the security properties of the protocol for the five common attacks in the IoT. The results of the experiments show that the proposed authentication protocol by the Blakley method is more efficient with increasing number of instructions in both fog structures and in a without fog structure, which shows a higher flexibility of the Blakley method than the Schemer because of the increasing number of instructions indicating increasing the number of nodes in the network. The proposed method has better performance.


Article
Optimization Using Taguchi Method for Physical and Mechanical Properties of Bio Mimicking Polymeric Matrix Composite for Orthodontic Application

Authors: Jenan S. Kashan
Pages: 181-187
Loading...
Loading...
Abstract

This work take in consideration the application of Taguchi optimization methodology in optimizing the parameters for processing (composition, compounding pressure) and their effects on the output physical (Density and true porosity) properties and mechanical(fracture strength and microhardness) properties for the Nano HA,Al2O3 fillers reinforced HDPE hybrid composite material for orthodontic application. An orthogonal array of the Taguchi approach was used to analyses the effect of the processing parameters on the physical and mechanical properties. On the other hand, the surface roughness and particle size distribution were also calculated to study their effect on the output properties. The result shows that the Taguchi approach can determine the best combination of processing parameters that can provide the optimal physical and mechanical conditions, which are the optimum values (the optimum composition was15HA/ 5Al2O3/80HDPE, and optimum compounding pressure was102 MPa.

Table of content: volume:37 issue:5part (A) Engineering