Magneto-rheological (MR) Valve is one of the devices generally used to control the speed of Hydraulic actuator using MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. The finite element analysis is carried out on this valve to optimize its design. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMM). The Model dimensions of MR valve, material properties and the circuit properties of valve coil are taken into account. The results of analysis are presented in terms of magnetic strength and magnetic flux density. The valve can be operated with variable flow rate by varying the current. It is found that the current is inversely proportional to the flow rate. High current low flow rate and vice versa.
In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
In his opus, Ted Hughes has annexed new and fresh territories of signification to the very notion of the literary animal. Building on the earlier modernist example of the Lawrencian legacy that dwells upon the question of animalism, Hughes seems to have stepped further into the terrain of the sheer struggle when, in his hands, the grotesquerie of survival and violence energizes the topos of the literary animal in his postmodern bestiary. In Hughes’s elemental poetic process this grotesquerie and violence stages the literary animal as a vital poetic device or motif that is finally restored to the primitive power of poetry. In his “Thrushes”, he thus defamiliarizes these tiny creatures’ acts of being to bring upfront into focus thi
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MorePurpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThe research aims to identify the level of psychological pollution in Iraqi society and the significant differences in psychological pollution in the Iraqi society according to variables. A sample of (600) individuals randomly selected from all governorates of Iraq, with (285) males and (315) females was used in the current study. The researcher adopted the scale of (Muhammad, 2004) psychological pollution consisting of (118) items, which limited (46) items after modification distributed into four areas: denial and abuse of the civilized identity, attachment to foreign formal aspects, effeminacy, and anarchism. The results of the research showed that there is no statistical significance among the individuals of the research sample. They
... Show More