This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.
Electro-chemical Machining is significant process to remove metal with using anodic dissolution. Electro-chemical machining use to removed metal workpiece from (7025) aluminum alloy using Potassium chloride (KCl) solution .The tool used was made from copper. In this present the optimize processes input parameter use are( current, gap and electrolyte concentration) and surface roughness (Ra) as output .The experiments on electro-chemical machining with use current (30, 50, 70)A, gap (1.00, 1.25, 1.50) mm and electrolyte concentration (100, 200, 300) (g/L). The method (ANOVA) was used to limited the large influence factors affected on surface roughness and found the current was the large influence f
... Show MoreIn this study, the results of x-ray diffraction methods were used to determine the Crystallite size and Lattice strain of Cu2O nanoparticles then to compare the results obtained by using variance analysis method, Scherrer method and Williamson-Hall method. The results of these methods of the same powder which is cuprous oxide, using equations during the determination the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (28.302nm) and the lattice strain (0.03541) of the variance analysis method respectively and for the Williamson-Hall method were the results of the crystallite size (21.678nm) and lattice strain (0.00317) respectively, and Scherrer method which gives the value of c
... Show MoreNet pay is one of the most important parameters used in determining initial oil in place of a reservoir. It can be delineated through the using of limiting values of the petrophysical properties of the reservoir. Those limiting values are named as the cutoff. This paper provides an insight into the application of regression line method in estimating porosity, clay volume and water saturation cutoff values in Mishrif reservoir/ Missan oil fields. The study included 29 wells distributed in seven oilfields of Halfaya, Buzurgan, Dujaila, Noor, Fauqi, Amara and Kumait.
This study is carried out by applying two types of linear regressions: Least square and Reduce Major Axis Regression.
The Mishrif formation was
... Show MoreAn experimental study was carried out to improve the surface roughness quality of the stainless steel 420 using magnetic abrasive finishing method (MAF). Four independent operation parameters were studied (working gap, coil current, feed rate, and table stroke), and their effects on the MAF process were introduced. A rotating coil electromagnet was designed and implemented to use with plane surfaces. The magnetic abrasive powder used was formed from 33%Fe and 67% Quartz of (250µm mesh size). The lubricant type SAE 20W was used as a binder for the powder contents. Taguchi method was used for designing the experiments and the optimal values of the selected parameters were found. An empirical equation representing the r
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe microstructure and wear properties of 392 Al alloy with different Mg contents were studied using centrifugal casting. All melted alloys were heated to 800 ºC and poured into the preheated centrifugal casting mold (200-250 ºC) at different mould rotational speeds (1500, 1900 and 2300 r.p.m). It is clear from the results obtained that wear rate was dependent on the Mg content, applied load and mould rotational speed. Furthermore, wear test showed that the minimum wear rate was found in the inner layer of produced rings at mould rotational speed of 1900 r.p.m and Mg content of 5%.
Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreThis paper presents the theoretical and experimental results of drilling high density
polyethylene sheet with thickness of 1 mm using millisecond Nd:YAG pulsed laser. Effects of laser
parameters including laser energy, pulse duration and peak power were investigated. To describe and
understand the mechanism of the drilling process Comsol multiphysics package version 4.3b was used to
simulate the process. Both of the computational and experimental results indicated that the drilling
process has been carried out successfully and there are two phases introduced in the drilling process,
vaporization and melting. Each portion of these phases depend on the laser parameters used in the
drilling process