Preferred Language
Articles
/
alkej-251
Studying and Modeling the Effect of Graphite Powder Mixing Electrical Discharge Machining on the Main Process Characteristics
...Show More Authors

Abstract

This paper concerned with study the effect of a graphite micro powder mixed in the kerosene dielectric fluid during powder mixing electric discharge machining (PMEDM) of high carbon high chromium AISI D2 steel. The type of electrode (copper and graphite), the pulse current and the pulse-on time and mixing powder in kerosene dielectric fluid are taken as the process main input parameters. The material removal rate MRR, the tool wear ratio TWR and the work piece surface roughness (SR) are taken as output parameters to measure the process performance. The experiments are planned using response surface methodology (RSM) design procedure. Empirical models are developed for MRR, TWR and SR, using the analysis of variance (ANOVA).The best results for the productivity of the process (MRR) obtained when using the graphite electrodes, the pulse current (22 A), the pulse on duration (120 µs) and using the graphite powder mixing in kerosene dielectric reaches (82.84mm³/min). The result gives an improvement in material removal rate of (274%) with respect to the corresponding value obtained when copper electrodes with kerosene dielectric alone. The best results for the tool wear ratio (TWR) of the process obtained when using the copper electrodes, the pulse current (8 A), the pulse on duration (120 µs) and using the kerosene dielectric alone reaches (0.31 %). The use of graphite electrodes, the kerosene dielectric with 5g/l graphite powder mixing, the pulse current (8 A), the pulse on duration (40 µs) give the best surface roughness of a value (2.77 µm).This result yields an improvement in SR by (141%) with respect to the corresponding value obtained when using copper electrodes and the kerosene dielectric alone with the same other parameters and machining conditions.

Keywords: EDM, RSM, MRR, TWR, SR, AISI D2die steel, graphite powder mixing.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
""The Story of the Slaughtered in the Poetry of Hava Pinhas-Cohen" תימת העקדה בשירתה של חוה פנחס כוהן" עוזר פרופ' ד''ר שיימא פאדל חמודי
...Show More Authors

במחקר זה אבקש לעסוק בתימת העקדה בשירתה של חוה פנחס כוהן. סיפור העקדה נבחר לעמוד בבסיסה של המחקר ממספר סיבות. ראשית, כיון שהסיפור הוא סיפור משמעותי, מאורע חשוב במסורת היהודית. שנית, כיוון שעניינו אותי מערכות היחסים השונות בסיפור. מערכת היחסים בין יהוה לאברהם, מערכת היחסים בתוך המשפחה ומערכת היחסים בין יצחק לאברהם. במערכות היחסים הללו משכו את תשומת לבי גם אותם דברים שאינם כתובים בתנ״ך (לדוגמה: מה הייתה תגובת שרה

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors

Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
work alienation and its impact on Job Satisfaction Applied Research
...Show More Authors

The research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Thu Jan 01 2009
Journal Name
Ibn Al– Haitham Journal For Pure And Applied Science
Some Results on Fibrewise Lindelöf and Locally Lindelöf Topological Spaces
...Show More Authors

In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B

... Show More
Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref