The purpose of this study is designate quenching and tempering heat treatment by using Taguchi technique to determine optimal factors of heat treatment (austenitizing temperature, percentage of nanoparticles, type of base media, nanoparticles type and soaking time) for increasing hardness, wear rate and impact energy properties of 420 martensitic stainless steel. An (L18) orthogonal array was chosen for the design of experiment. The optimum process parameters were determined by using signal-to-noise ratio (larger is better) criterion for hardness and impact energy while (Smaller is better) criterion was for the wear rate. The importance levels of process parameters that effect on hardness, wear rate and impact energy properties were obtained by using analysis of variance which applied with the help of (Minitab18) software. The variables of quenching heat treatment were austenitizing temperature (985 C˚,1060 C˚),a soaking times (50,70 and 90 minutes) respectively, Percentage of volumetric fractions of nanoparticles with three different levels(0.01, 0.03 and 0.08 %) were prepared by dispersing nanoparticles that are (α-Al2O3,TiO2 and CuO) with base fluids (De-ionized water, salt solution and engine oil).The specimens were tempered at 700°C after quenching of nanofluids for (2 hours).The results for ( S/N) ratios showed the order of the factors in terms of the proportion of their effect on hardness, and wear rate properties as follow: Austenitizing temperature ( 1060 C˚),Type of base media (salt solution), Nanoparticles type (CuO), Percentage of nanoparticles (0.08%) and Soaking time(90min) was the least influence while for the impact energy were as follows: Type of base media (oil), Austenitizing temperature (985C˚), Percentage of nanoparticles (0.01%), Nanoparticles type (α-Al2O3) and last soaking time (50min).
:
While practicing of International business particularly that centered on foreign direct investment, let on one side, to achieving objectives of transnational corporations specially that represented in continuous pursue to improving its cash flows and maximization of stockholders wealth which is considered the most important objective to the transnational corporations, but in the same time its lead, on other side, to increasing the foreign exchange risk exposuring these corporations. So, the transnational corporations (TNCs) struggling to make strategies which are dealing in smart way, with this risk and its management in way that enable to avoiding risk comple
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreIn this paper, we introduce a new class of sets, namely , s*g-ï¡-open sets and we show that the family of all s*g-ï¡-open subsets of a topological space ) ,X( ï´ from a topology on X which is finer than ï´ . Also , we study the characterizations and basic properties of s*g-ï¡open sets and s*g-ï¡-closed sets . Moreover, we use these sets to define and study a new class of functions, namely , s*g- ï¡ -continuous functions and s*g- ï¡ -irresolute functions in topological spaces . Some properties of these functions have been studied .
Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig
... Show MoreThe study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
The study was conducted on twenty dogs from variety breeds to estimate the
incidence of tumor mass and determine the risk factors of survey to cases of a year
in veterinary hospital in Baghdad. The most common clinical signs were, ulceration,
bleeding into lesions in addition to drowsiness, anorexia, fever and the others were
depended tumor's location in dog's body like lameness, lacrimation and bloody
constipation etc.
The results showed 70% of the infected dogs were working with military forces
and 30% of them were pet dogs and we found that the highest percentage of tumor
accrued in dogs aged more than 10 years and the females recorded 60% of infection.
Terrier breed had the highest percentage of infection (
Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables