Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Iraqi kaolin was used for the preparation and characterization of NaY zeolite for biodiesel production via esterification reaction. Oleic acid was used usually as a typical simulated feedstock of high acid number for the esterification reaction.
The chemical composition for the prepared Nay zeolite is as following: (Ca2.6Na1.K0.1)(Al6.3Si17.7)O48.16H2O, the silica to alumina ratio in the prepared catalyst was found equal to 2.6 and Na2O content was 12.26 wt. %, with relative crystallinity equal to 147.4 % obtained by the X-ray diffraction. The surface area result shows that the prepared catalyst has 330 m2
... Show MoreThe Adaptive Optics technique has been developed to obtain the correction of atmospheric seeing. The purpose of this study is to use the MATLAB program to investigate the performance of an AO system with the most recent AO simulation tools, Objected-Oriented Matlab Adaptive Optics (OOMAO). This was achieved by studying the variables that impact image quality correction, such as observation wavelength bands, atmospheric parameters, telescope parameters, deformable mirror parameters, wavefront sensor parameters, and noise parameters. The results presented a detailed analysis of the factors that influence the image correction process as well as the impact of the AO components on that process
Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.
In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py
... Show MoreIn this paper the variable structure control theory is utilized to derive a discontinuous controller to the magnetic levitation system. The magnetic levitation system model is considered uncertain, which subjected to the uncertainty in system parameters, also it is open-loop unstable and strongly nonlinear. The proposed variable structure control to magnetic levitation system is proved, and the area of attraction is determined. Additionally, the chattering, which induced due to the discontinuity in control law, is attenuated by using a non-smooth approximate. With this approximation the resulted controller is a continuous variable structure controller with a determined steady state error according to the selected control
... Show MoreA metal-assisted chemical etching process employing p-type silicon wafers with varied etching durations is used to produce silicon nanowires. Silver nanoparticles prepared by chemical deposition are utilized as a catalyst in the formation of silicon nanowires. Images from field emission scanning electron microscopy confirmed that the diameter of SiNWs grows when the etching duration is increased. The photoelectrochemical cell's characteristics were investigated using p-type silicon nanowires as working electrodes. Linear sweep voltammetry (J-V) measurements on p-SiNWs confirmed that photocurrent density rose from 0.20 mA cm-2 to 0.92 mA cm-2 as the etching duration of prepared SiNWs increased from 15 to 30 min. The
... Show MoreUndesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o