This work presents a novel technique for the detection of oil aging in electrical transformers using a single mode optical fiber sensor based on surface plasmon resonance (SPR). The aging of insulating oil is a critical issue in the maintenance and performance of electrical transformers, as it can lead to reduce insulation properties, increase risk of electrical breakdown, and decrease operational lifespan. Many parameters are calculated in this study in order to examine the efficiency of this sensor like sensitivity (S), signal to noise ratio (SNR), resolution (refractive index unit) and figure of merit (FOM) and the values are for figure of merit is 11.05, the signal to noise ratio is 20.3, the sensitivity is 6.63, and the resolution is 3.01*10^-5 .
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
In this research, the electrical characteristics of glow discharge plasma were studied. Glow discharge plasma generated in a home-made DC magnetron sputtering system, and a DC-power supply of high voltage as input to the discharge electrodes were both utilized. The distance between two electrodes is 4cm. The gas used to produce plasma is argon gas which flows inside the chamber at a rate of 40 sccm. The influence of work function for different target materials (gold, copper, and silver), - 5cm in diameter and around 1mm thickness - different working pressures, and different applied voltages on electrical characteristics (discharge current, discharge potential, and Paschen’s curve) were studied. The results showed that the discharge cur
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi
... Show MoreCrude oil still affects many countries because it is one of the essential fuel sources. It makes life more manageable in modern communities and cannot be overstated because it is easy to use and find. However, the pollution caused by its use in industries such as mining, transportation, and the oil and gas business, especially soil pollution, cannot be ignored. Soil pollution is an issue in most communities because it influences people and ecology. Accidental infusions and spills of ore oils are prevalent occurrences leading to the entire or fractional exchange of the soil pore fluid by oil-contaminated soils that have affected the geotechnical engineering properties. The liquid limitations for polluted soil grades silty loam and sa
... Show MoreCrude oil still affects many countries because it is one of the essential fuel sources. It makes life more manageable in modern communities and cannot be overstated because it is easy to use and find. However, the pollution caused by its use in industries such as mining, transportation, and the oil and gas business, especially soil pollution, cannot be ignored. Soil pollution is an issue in most communities because it influences people and ecology. Accidental infusions and spills of ore oils are prevalent occurrences leading to the entire or fractional exchange of the soil pore fluid by oil-contaminated soils that have affected the geotechnical engineering properties. The liquid limitations for polluted soil grades silty loam and sa
... Show MoreBackground: Poly propylene fibers with and without silane treatment have been used to reinforce heat cure denture base acrylic but, some mechanical properties like transverse strength, impact strength, tensile strength, hardness, wear resistance and wettability. Which are related to the clinical use of the prosthesis are not evaluated yet. The aim of the study is to identify the influence of incorporation of treated and untreated fibers on these properties Materials and methods: Eighty four heat cure acrylic specimens were constructed by conventional flasking technique. They were divided into six groups according to the tests and each group was subdivided into two subgroups control and experimental groups (seven samples for each subgroup
... Show More