This paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreIn this work , an effective procedure of Box-Behnken based-ANN (Artificial Neural Network) and GA (Genetic Algorithm) has been utilized for finding the optimum conditions of wt.% of doping elements (Ce,Y, and Ge) doped-aluminizing-chromizing of Incoloy 800H . ANN and Box-Behnken design method have been implanted for minimizing hot corrosion rate kp (10-12g2.cm-4.s-1) in Incoloy 800H at 900oC . ANN was used for estimating the predicted values of hot corrosion rate kp (10-12g2.cm-4.s-1) . The optimal wt.% of doping elements combination to obtain minimum hot corrosion rate was calculated using genetic alg
... Show MoreThe aim of this work is to calculate the one- electron expectation value of the electronic charge of atomic system Z=2,3….7 and we compare with He atom . the electronic density function D(r1) of He atom and like ions are evaluated . using Hartree –Fock wave.
Abstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreThe ideas and information obtained by the viewer in the cinema have always been the source of the visual image, but that doesn’t negate the fact that the mental image can produce a lot of the information and ideas in the cinematic art and the most important means to achieve this mental image in the film is the eloquent cinematic sound. This research is conducted to show this important and effective contribution of the sound in the production of the mental image. Hence the importance of this research is in that it addresses an important issue which is the eloquent performance of the sound and its role in the production of the mental image inside the space of the feature film. This research concerns those working the field of cinema and
... Show MoreThe topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore
... Show MoreScenes of love constitute a large space within the orbit of the movies, so that there is almost no film (no matter what kind) void of these scenes, as they are associated with many dimensions and they constitute a major attraction for viewers, and thus the direction solutions and their connection to the director's vision constitute a large part in the process of employing signs to highlight what should be highlighted or to refer to it symbolically on the grounds that the director does not have full freedom in the transfer of scenes of love at all levels as they are in reality. The research included three sections within the theoretical framework:The first section: the concept of image and its rhetorical importance. This section discussed
... Show MoreThe information revolution، the new language has become one for all the peoples of the world through handling and exchange and to participate in all key areas (economic، cultural and scientific) and Accounting episode of this revolution has turned most of the traditional systems (manual) in companies to automated systems، this transformation in the regulations summoned from the auditors that develops their traditional examination automated systems so had to provide tools for auditing help auditors to keep abreast of developments and as a result there is no evidence checksum Local Private audited automated systems came search to provide evidence helps auditors for guidance as part of COBIT، which provides audit procedures Detailed inf
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show More