In this research, (MOORA) approach based– Taguchi design was used to convert the multi-performance problem into a single-performance problem for nine experiments which built (Taguchi (L9) orthogonal array) for carburization operation. The main variables that had a great effect on carburizing operation are carburization temperature (oC), carburization time (hrs.) and tempering temperature (oC). This study was also focused on calculating the amount of carbon penetration, the value of hardness and optimal values obtained during the optimization by Taguchi approach and MOORA method for multiple parameters. In this study, the carburization process was done in temperature between (850 to 950 ᵒC) for 2 to 6 hours. Quenching was done for the specimens after heat treatments in furnace chamber by using different quench solutions, water, salt and polyvinyl alcohol. Analysis of variances - (ANOVA) were performed for nine experiments in order to optimize the problem that was associated with multiple criteria (parameter) to achieve maximum hardness and depth penetration. The program results showed that the optimum conditions are carburization temperature (950 oC), carburization time (2 hrs.), tempering temperature (200oC), tempering time (10 hrs.), and activator (10 wt. %). Furthermore, the best quenching media was the polyvinyl alcohol.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreA new benzylidene derivative, namely N-benzylidene-5-phenyl-1,3,4-thiadiazol-2-amine (BPTA), has been synthesized and instrumentally confirmed with Elemental Analysis (CHN), Nuclear Magnetic Resonance (NMR), and Fourier Transform Infrared Spectroscopy (FT-IR). Titanium Dioxide (TiO2) nanoparticles (NPs) were synthesized and characterized by X-ray. The mutualistic complementary dependence of BPTA with TiO2 nanoparticles as anti-corrosive inhibitor on mild steel (MS) in 1.0 M hydrochloric acid has been tested at various concentrations and various temperatures. The methodological work was achieved by gravimetric measurement methods complemented with surface analysis. The synthesized inhibitor concentrations were 0.1 mM to 0.5 mM and the temper
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreThis paper is dealing with non-polynomial spline functions "generalized spline" to find the approximate solution of linear Volterra integro-differential equations of the second kind and extension of this work to solve system of linear Volterra integro-differential equations. The performance of generalized spline functions are illustrated in test examples
Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method
... Show MoreStrategy Descrtibes How an Organization Matches its own Capabilites With Opportunities in Environment , in Order to Accomplish its Overall Objectives , So That The Organization is Considering Responding to Challenges by Adopting one or More of Strategies, Like Differentioning its Product, or Achieving Cost Leadership.
The Key Role of Management Accountant is to Evlaute The Successful it Has Been in Implementing Organization Strategy.
This Research Target to Explain The Key Role of Management Accountant in Evaluate of Organization Strategy. by Strategic Analysis of Operating Income From Specific Sources Such as Cost Savings and Growth in Stead of Emphasizing Only The Aggrega
... Show More
This paper analyses the relationship between selected macroeconomic variables and gross domestic product (GDP) in Saudi Arabia for the period 1993-2019. Specifically, it measures the effects of interest rate, oil price, inflation rate, budget deficit and money supply on the GDP of Saudi Arabia. The method employs in this paper is based on a descriptive analysis approach and ARDL model through the Bounds testing approach to cointegration. The results of the research reveal that the budget deficit, oil price and money supply have positive significant effects on GDP, while other variables have no effects on GDP and turned out to be insignificant. The findings suggest that both fiscal and monetary policies should be fo
... Show MoreThis study presents the effect of laser energy on burning loss of magnesium from the holes' drilled in aluminum alloy 5052. High energy free running pulsed Nd:Glass laser of 300 µs pulse duration has been used to perform the experiments. The laser energy was varied from 1.0 to 8.0 Joules, The drilling processes have been carried out under atmospheric pressure and vacuum inside a specially designed chamber. Microhardness of the blind drilled holes has been investigated .The results indicated that the magnesium loss could be manipulated by adjusting the focusing conditions of the laser beam. Almost, the obtained holes were free of cracks with low taper and low sputter deposition. .The holes performed under atmospheric conditions have high
... Show MoreThis research deals with the effect of constructive conflict of the organizational identification .These relatively recent subjects have relative importance in the field of administration and they have strong effect in the success of organizations .The objective of this research is to detect the level of the constructive conflict and the organizational identification in the center of The Ministry of Planning. So, two major hypotheses were formulated The first are searched the correlation between the constructive conflict and the organizational identification and it emerged with four sub-hypotheses searched the correlation among every dimension of the constructive conflict with the organizational identification .The second major h
... Show More