The corrosion behavior of carbon steel at different temperatures 100,120,140 and 160 Cͦ under different pressures 7,10 and 13 bar in pure distilled water and after adding three types of oxygen scavengers Hydroquinone, Ascorbic acid and Monoethanolamine in different concentrations 40,60 and 80 ppm has been investigated using weight loss method. The carbon steel specimens were immersed in water containing 8.2 ppm dissolved oxygen (DO) by using autoclave. It was found that corrosion behavior of carbon steel was greatly influenced by temperature with high pressure. The corrosion rate decreases, when adding any one of oxygen scavengers. The best results were obtained at a concentration of 80 ppm of each scavenger. It was observed that hydroquinone is the best among the other scavengers in reducing the corrosion rate at the temperatures and pressures of this investigation and most efficient in the consumption of oxygen especially 80 ppm, it reduces the concentration of oxygen in water from 8.2 to 0.8 ppm, while the ascorbic acid reduces the oxygen concentration to 1.4 and monoethanolamine reduces the concentration of oxygen to 1.9 . It has been observed that hydroquinone reacts with oxygen quickly and at low temperatures while the other scavengers react slowly with oxygen.
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreWith the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show MoreIn this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The robot arm is the most popular robotic form used in industry. Thus, it is crucial to make a system programming which could controlled the movement of each part in the industrial robot to make it works properly. One of the simplest models of the robot arm is EDARM ED-7100 which has a controller to control the movement of the robot arm manually. In this study, the robot controller has been redesigned in order to improve this robot's function. The new controller system used AT89S52 microcontroller which has wire connected to the robot hand. A function has been added with this controller to improve the system of controlling and becomes better than the previous system (only manually). The functions of the new system include three mo
... Show MoreBackground: Nasopharyngeal carcinoma (NPC) is one of the most challenging tumors because of their relative inaccessibility and that their spread can occur without significant symptoms with few signs, but Radiotherapy (RT) has a role in treatment of it.
Objectives: To show that RT is still the modality of choice in the treatment of NPC, to study modes of presentations, commonest histopathological types and their percentages, to show differences in the sensitivities of these types to RT and to find out a 5 year survival rate(5YSR) and its relation with lymph node involvement.
Methods: This is a retrospective study of 44 patients with NPC who were treated with routine RT from 1988-2007 at the institute of radiology and nuclear medicin
he assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of
... Show More