The microdrilling and nanodrilling holes are produced by a Q-switched Nd :YAG laser (1064 nm) interaction with 8009 Al alloy using nanoparticles. Two kinds of nanoparticles were used with this alloy. These nanoparticles are tungsten carbide (WC) and silica carbide (SiC). In this work, the microholes and nanoholes have been investigated with different laser pulse energies (600, 700 and 800)mJ, different repetition rates (5Hz and 10Hz) and different concentration of nanoparticles (90%, 50% and 5% ). The results indicate that the microholes and nanoholes have been achieved when the laser pulse energy is 600 mJ, laser repetition rate is 5Hz, and the concentration of the nanoparticles (for the two types of nanoparticles) is 5%. The diameters of holes are increase to millimetres and cracks are formed with increasing of the laser pulse energy, laser repetition rate with the using of high concentration of nanofluid.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation techniq
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreExpressions for the molecular topological features of silicon carbide compounds are essential for quantitative structure-property and structure-activity interactions. Chemical Graph Theory is a subfield of computational chemistry that investigates topological indices of molecular networks that correlate well with the chemical characteristics of chemical compounds. In the modern age, topological indices are extremely important in the study of graph theory. Topological indices are critical tools for understanding the core topology of chemical structures while examining chemical substances. In this article, compute the first and second k-Banhatti index, modified first and second k-Banhatti index, first and second k-hyper Banhatti index, fir
... Show MoreNowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s
... Show More
This research aims at know the position of Al-Jassas Al- Hanafi (D. 370 AH) of "As-Sifat Al- Khbriya", through his interpretation: (the provisions of Qur'an), by studying his interpretation of the verses related to this issue.
The most significant results of this study that Al-Jassas did not consider the words that called: "As-Sifat Al- Khbriya" as adjectives to Allah almighty, but he consider them contained an inappropriate meaning to Allah almighty, thus it must be referred to the perfect arbitrator, so he was believe in opinion of interpretation. and interpretations of Al-Jassas for the related of the Qur'an verses relat
... Show MoreIn this investigation a high density polyethylene (HDPE) was used as a substitute to polyvinylchloride in the production of lead acid battery separators. This has been achieved by preparing mixtures of different percentages of the feed materials which include a high density polyethylene (HDPE) locally produced, filler materials such as silica and oils such as dioctylphthalate (DOP) or paraffin which were added to the mixture to improve the final properties of the separator. The materials were compounded by two roll-mills under the same conditions. The following parameters are involved: &nb
... Show More
The aim of this research is to identify the Andalusia poet Abu Izac Al-Zauali , whose most of his poetry and biography had been lost, as well as many Andalusia poets. So this research is hoped to be the first step to shed the light on the poet’s life and poetry and to document his poetry as other writers do. It is also hoped that this research would pave the way , God willing , to the steps of finding more references about this poet .
Key Words: (Al-Zauali, Cordoba, Al-Ruaini choices, Andalusia Poetry , Almuahdi Era).
This study examined the tagged (the matter, its ruling, and examples of its applications in Ahmadiyya interpretations), the study of devising formulas of commissioning, especially the matter from the book of interpretation, which is: (Ahmadiyyeh’s interpretations), and the contemplative of the nature of (Ahmadiyya’s interpretations) realizes that the cognitive, linguistic and juristic knowledge product and the verses of judgments And other is the focus of this immortal travel, as it is truly a comprehensive book containing what the students of knowledge, scholars and the general public need in terms of interpreting the legal verses, and it is not possible to reach an understanding of the Book of God Almighty, and to clarify his purpo
... Show MoreThe existing investigation explains the consequence of irradiation of violet laser on the optic properties of (CoO2) films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser in this technique. From the XRD analysis, the crystalline existence with trigonal crystal system was when the received films were processed by continuous violet laser (405 nm) with power (1W) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time(0,30,45,60,75,90 min