This paper investigate a sensorless speed control of a separately excited dc motor fed from a buck type dc-dc converter. The control system is designed in digital technique by using a two dimension look-up table. The performance of the drive system was evaluated by digital simulation using Simulink toolbox of Matlab.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe essence of the new work in the satellite TV channels is to provide news coverage of news that will inform the people of what is going on around them in order to increase their political, social, economic and cultural awareness and this drives them to take positions or certain behaviors on according to what the communicator in these channels wants. News and news reports are generally used as a psychological variable to influence public opinion and does not offer interestingness and information. Therefore, satellite TV channels have assumed special attention towards their correspondents desiring to achieve scoop in news coverage and to have the final word in reading events and install it
... Show MoreThe current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreCollapsible soil has a metastable structure that experiences a large reduction in volume or collapse when wetting. The characteristics of collapsible soil contribute to different problems for infrastructures constructed on its such as cracks and excessive settlement found in buildings, railways channels, bridges, and roads. This paper aims to provide an art review on collapse soil behavior all over the world, type of collapse soil, identification of collapse potential, and factors that affect collapsibility soil. As urban grow in several parts of the world, the collapsible soil will have more get to the water. As a result, there will be an increase in the number of wetting collapse problems, so it's very important to com
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe research aimed to study the job satisfaction of the staff of the Federal board of supreme Audit and its relation to the effectiveness of their performance, The questionnaire was adopted as a main tool in the collection of data and information from a random sample of (54) employees of the Federal board of supreme Audit. In light of this, the data were collected and analyzed and the hypotheses were tested using the statistical program (SPSS).
The researchers reached a number of conclusions, the most important of which were: (1) the respondents' response to the variables of job satisfaction and the effectiveness of the performance were medium; (2) there was a significant relationship between job satisfaction and performance effe
... Show MoreBackground: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola
... Show MoreIn Iraq, government contributions to the public companies have become a very important aspect which contributes to the survival and sustainability of these institutions as it consider one of the main sources of funding, if not it consider the basis of funding.
According to the vital roles assigned to these institutions to follow up, which usually include important activities in the national economy, the research focused on studying the field reality of the method used in evaluating the stock of total production and purchases of goods for the purpose of selling the strategic commodities of the General Company for Grain Trade. As a result, the aim of this study came to came to highlight&n
... Show More