The purpose of this study is designate quenching and tempering heat treatment by using Taguchi technique to determine optimal factors of heat treatment (austenitizing temperature, percentage of nanoparticles, type of base media, nanoparticles type and soaking time) for increasing hardness, wear rate and impact energy properties of 420 martensitic stainless steel. An (L18) orthogonal array was chosen for the design of experiment. The optimum process parameters were determined by using signal-to-noise ratio (larger is better) criterion for hardness and impact energy while (Smaller is better) criterion was for the wear rate. The importance levels of process parameters that effect on hardness, wear rate and impact energy properties were obtained by using analysis of variance which applied with the help of (Minitab18) software. The variables of quenching heat treatment were austenitizing temperature (985 C˚,1060 C˚),a soaking times (50,70 and 90 minutes) respectively, Percentage of volumetric fractions of nanoparticles with three different levels(0.01, 0.03 and 0.08 %) were prepared by dispersing nanoparticles that are (α-Al2O3,TiO2 and CuO) with base fluids (De-ionized water, salt solution and engine oil).The specimens were tempered at 700°C after quenching of nanofluids for (2 hours).The results for ( S/N) ratios showed the order of the factors in terms of the proportion of their effect on hardness, and wear rate properties as follow: Austenitizing temperature ( 1060 C˚),Type of base media (salt solution), Nanoparticles type (CuO), Percentage of nanoparticles (0.08%) and Soaking time(90min) was the least influence while for the impact energy were as follows: Type of base media (oil), Austenitizing temperature (985C˚), Percentage of nanoparticles (0.01%), Nanoparticles type (α-Al2O3) and last soaking time (50min).
In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv
... Show MoreData hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices
... Show MoreIn this paper, we shall investigate and study some kinds of ideals in an intuitionistic fuzzy setting, they are called complete intuitionistic fuzzy subalgebra, complete intuitionistic fuzzy ideal, and complete intuitionistic fuzzy ideal. In this study, we have also proposed some hypotheses to explain some of the relationships between these kinds of intuitionistic fuzzy ideals.
Image pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This paper presents an architecture for the data warehouse of outpatient healthcare (DWOP) as a data repository collects data from two different sources (Databases of outpatient healthcare and Excel files from hospitals) and provides storage, functionality and responsiveness to queries to meet decision makers requirements.
Successfully supporting managerial decision-making is critically dependent upon the availability of integrated, high quality information organized and presented in a timely and easily understood manner. “On-Line Analytical Processing (OLAP) is utilized for decision support to get interesting information†from the data warehouse with a rapid execution time. OLAP is considered one of Business Intelligence
NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
In this paper, the concept of Jordan triple higher -homomorphisms on prime
rings is introduced. A result of Herstein is extended on this concept from the ring into the prime ring . We prove that every Jordan triple higher -homomorphism of ring into prime ring is either triple higher -homomorphism or triple higher -anti-homomorphism of into .