Preferred Language
Articles
/
5heU5I8BVTCNdQwCp39D
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Wed Sep 30 2020
Journal Name
Cfd Letters
Numerical Analysis for Solar Panel Subjected with an External Force to Overcome Adhesive Force in Desert Areas
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Art Image Compression Based on Lossless LZW Hashing Ciphering Algorithm
...Show More Authors
Abstract<p>Color image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and </p> ... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Numerical Study for HAWT Wake shape with different Angles of Attack
...Show More Authors

Increasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wak

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 14 2023
Journal Name
Iop Conf. Series: Earth And Environmental Science
Calculating some Powers and Traction Force for Two Plows in Primary Tillage
...Show More Authors

Traction force and power requirement when performing primary tillage occupy the minds of almost farmers, this field research had aim to determine and calculate the pulling force of the most commonly used moldboard and chisel plows, the research conducted in silt clay loam for chisel and moldboard plows as the main factor, two depths of tillage 18 and 25 cm as a second factor and three speeds of tractor 2.55, 4.30 and 6.15 km.h-1 as a third factor. Moldboard plow recorded least traction force 7.550 kN, drawbar power 11.583 hp, power losses due to slippage 1.088 hp, power on the rear axle of the tractor 15.770 hp and brake horse power 17.495 hp. Chisel plow recorded best traction efficiency 76.217 % and total traction efficiency 68.659 %. Dep

... Show More
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Slot Design Procedure for a NACA 4412 at High Angle of Attack
...Show More Authors

The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial prog

... Show More
View Publication
Publication Date
Wed Apr 01 2020
Journal Name
Saudi Pharmaceutical Journal
Pharmacist role to enhance the prescribing of hospital discharge medications for patients after heart attack
...Show More Authors

View Publication
Publication Date
Mon Apr 09 2018
Journal Name
Al-khwarizmi Engineering Journal
Neural Network Modeling of Cutting Force and Chip Thickness Ratio for Turning Aluminum Alloy 7075-T6
...Show More Authors

The turning process has various factors, which affecting machinability and should be investigated. These are surface roughness, tool life, power consumption, cutting temperature, machining force components, tool wear, and chip thickness ratio. These factors made the process nonlinear and complicated. This work aims to build neural network models to correlate the cutting parameters, namely cutting speed, depth of cut and feed rate, to the machining force and chip thickness ratio. The turning process was performed on high strength aluminum alloy 7075-T6. Three radial basis neural networks are constructed for cutting force, passive force, and feed force. In addition, a radial basis network is constructed to model the chip thickness ratio. T

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Ant Colony Optimization Based Force-Position Control for Human Lower Limb Rehabilitation Robot
...Show More Authors

The aim of human lower limb rehabilitation robot is to regain the ability of motion and to strengthen the weak muscles. This paper proposes the design of a force-position control for a four Degree Of Freedom (4-DOF) lower limb wearable rehabilitation robot. This robot consists of a hip, knee and ankle joints to enable the patient for motion and turn in both directions. The joints are actuated by Pneumatic Muscles Actuators (PMAs). The PMAs have very great potential in medical applications because the similarity to biological muscles. Force-Position control incorporating a Takagi-Sugeno-Kang- three- Proportional-Derivative like Fuzzy Logic (TSK-3-PD) Controllers for position control and three-Proportional (3-P) controllers for force contr

... Show More
View Publication Preview PDF