Magneto-rheological (MR) valve is one of the devices generally used to control the speed of Hydraulic actuator of MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. A mathematical model for the MR valve is developed and the simulation is carried out to evaluate the newly developed MR valve. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMMR). The model dimensions of MR valve, material properties are taken into account. The results of analysis are presented in terms of magnetic strength H and magnetic flux density B. The simulation results based on the proposed model indicate that the efficiency of the proposed MR valve is superior to two other types of MR valves, under the same magnetic flux density. As a conclusion, the new valve design has improved the efficiency of MR valve significantly.
In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreIn this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
This research is determined by the study of the " cognitive references of the directorial imagination and modeling of the theatrical actor performance ." it has described an Iraqi theatrical model, The research began with the great importance of the director's imagination as the basic premise for crystallizing the director's vision according to its cognitive references in creating a solid performance model based on the aesthetic, intellectual and technical bases, It is also contributes to the formation of the theatrical show as a technical framework that presents the show in one unified fabric.
The research sought to reach through the problem of research, which is in the question of: What is the modeling of the
... Show MoreThe main objective of this study is to develop predictive models using SPSS software (version 18) for Marshall Test results of asphalt mixtures compacted by Hammer, Gyratory, and Roller compaction. Bulk density of (2.351) gm/cc, at OAC of (4.7) % was obtained as a benchmark after using Marshall Compactor as laboratory compactive effort with 75-blows. Same density was achieved by Roller and Gyratory Compactors using its mix designed methods.
A total of (75) specimens, for Marshall, Gyratory, and Roller Compactors have been prepared, based on OAC of (4.7) % with an additional asphalt contents of more and less than (0.5) % from the optimum value. All specimens have been subjected to Marshall Test. Mathematical model
... Show More