In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred between the proposed and original part so as to demonstrate the verification of the proposed method.
تقدم هذه الدراسة وصفا للطريقة المستخدمة في تحضير الكربون المنشط (AC)من بقايا الشاي. تم دراسة الخواص الفيزيائية والكيميائية وكفاءة الامتزاز للكربون المنشط المحضر. تم إنتاج الكربون المنشط (AC) على مرحلتين: الاولى التنشيط باستخدام حامض الفوسفوريك (H3PO4) والثانية الكربنة عند درجة حرارة 450 درجة مئوية. استخدم الكربون المنشط لغرض امتصاص العقار الدوائي السيبروفلوكساسين(CIP) . تمت دراسة عدة عوامل تشغيلية بدرجة حرار
... Show MoreThis paper proposes feedback linearization control (FBLC) based on function approximation technique (FAT) to regulate the vibrational motion of a smart thin plate considering the effect of axial stretching. The FBLC includes designing a nonlinear control law for the stabilization of the target dynamic system while the closed-loop dynamics are linear with ensured stability. The objective of the FAT is to estimate the cubic nonlinear restoring force vector using the linear parameterization of weighting and orthogonal basis function matrices. Orthogonal Chebyshev polynomials are used as strong approximators for adaptive schemes. The proposed control architecture is applied to a thin plate with a large deflection that stimulates the axial loadi
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreBegan the process of re-engineering processes in the private sector as a way to assist organizations in re-thinking how to run the business in order to improve production processes and reduce operational cost, to get to compete on a global level. That was a major restructuring by further evolution in the use of technology to support innovative operations.
Entered the technology in all areas of life and different regulations, This led to use as a change in all aspects The companies achieved success and progress today through the use of resources so as to ensure the wishes of the customers and their needs, and the requirements of the market primarily, Which is reflected on the basis of building strate
... Show MoreIn this investigative endeavor, a novel concrete variety incorporating sulfur-2,4-dinitrophenylhydrazine modification was developed, and its diverse attributes were explored. This innovative concrete was produced using sulfur-2,4-dinitrophenylhydrazine modification and an array of components. The newly created sulfur-2,4-dinitrophenylhydrazine modifier was synthesized. The surface texture resulting from this modifier was examined using SEM and EDS techniques. The component ratios within concrete, chemical and physical traits derived from the sulfur-2,4-dinitrophenylhydrazine modifier, chemical and corrosion resistance of concrete, concrete stability against water absorption, concrete resilience against freezing, physical and mechanical p
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreThis paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com
... Show More

