The purpose of this study is designate quenching and tempering heat treatment by using Taguchi technique to determine optimal factors of heat treatment (austenitizing temperature, percentage of nanoparticles, type of base media, nanoparticles type and soaking time) for increasing hardness, wear rate and impact energy properties of 420 martensitic stainless steel. An (L18) orthogonal array was chosen for the design of experiment. The optimum process parameters were determined by using signal-to-noise ratio (larger is better) criterion for hardness and impact energy while (Smaller is better) criterion was for the wear rate. The importance levels of process parameters that effect on hardness, wear rate and impact energy properties were obtained by using analysis of variance which applied with the help of (Minitab18) software. The variables of quenching heat treatment were austenitizing temperature (985 C˚,1060 C˚),a soaking times (50,70 and 90 minutes) respectively, Percentage of volumetric fractions of nanoparticles with three different levels(0.01, 0.03 and 0.08 %) were prepared by dispersing nanoparticles that are (α-Al2O3,TiO2 and CuO) with base fluids (De-ionized water, salt solution and engine oil).The specimens were tempered at 700°C after quenching of nanofluids for (2 hours).The results for ( S/N) ratios showed the order of the factors in terms of the proportion of their effect on hardness, and wear rate properties as follow: Austenitizing temperature ( 1060 C˚),Type of base media (salt solution), Nanoparticles type (CuO), Percentage of nanoparticles (0.08%) and Soaking time(90min) was the least influence while for the impact energy were as follows: Type of base media (oil), Austenitizing temperature (985C˚), Percentage of nanoparticles (0.01%), Nanoparticles type (α-Al2O3) and last soaking time (50min).
Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show MoreLet S be a prime inverse semiring with center Z(S). The aim of this research is to prove some results on the prime inverse semiring with (α, β) – derivation that acts as a homomorphism or as an anti- homomorphism, where α, β are automorphisms on S.
In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluati
... Show More