The vortex rate sensor is a fluidic gyroscope with no moving parts and can be used in very difficult conditions like radiation, high temperature and noise with minimum cost of manufacturing and maintenance. A vortex rate sensor made of wood has been designed and manufactured to study theoretically and experimentally its static performance .A rig has been built to carry out the study,
the test carried out with three different air flow rates (100, 150, and 200 l/min).The results show that the relation between the differential pressure taken from the sensor pickoff points and the angular velocity of the sensor was linear.The present work involved theoretical and experimental study of vortex rate sensor static characteristics .Vortex rat
Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Background: This study report the corrosion behavior of commercially pure titanium and Ti-6Al-4V alloy samples without coating and with hydroxyapatite, partial stabilized zirconia and mixture of partial stabilized zirconia and hydroxyapatite coating and comparison between them through electrochemical polarization tests in 37 0 C Hank's solution. Materials and methods: Electrophoretic deposition technique (EPD) was used to achieve the coating from each one of three types of the coating materials (HAP, PSZ and mixture of 50% HAP and 50%PSZ) on Cp Ti and Ti-6Al-4V alloy samples. The electrochemical corrosion test was performed when samples were exposed to Hank's solution prepared in the laboratory and the polarization potential, corrosion rate
... Show MoreBackground: The development of orthodontic biomaterials that attract less biofilm has been a goal for decades. Adhesion and colonization of cariogenic streptococci are considered to play key roles in the development of enamel demineralization related to orthodontic materials. The aim of this study was to quantitatively evaluate the Mutans streptococci adhesion to coated orthodontic archwires (Epoxy and Teflon) and uncoated archwires (stainless steel and nickel-titanium) with respect to incubation time in the presence and absence of saliva. Material and Method: Six types of archwires stainless steel and nickel titanium with two type of coating (Epoxy, Teflon) were used in this study. Twelve specimens of each archwire were incubated in steri
... Show MorePreparation and Characterization of Maleate, Tartarate,and Phthalate Modified Pectin
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More