This work describes the weathering effects (UV-Irradiation, and Rain) on the thermal conductivity of PS, PMMA, PS/PMMA blend for packaging application. The samples were prepared by cast method at different ratios (10, 30, 50, 70, and 90 %wt). It was seen that the thermal conductivity of PMMA (0.145 W/m.K), and for PS(0.095 W/m.K), which increases by PS ratio increase up to 50% PS/PMMA blend then decreased that was attributed to increase in miscibility of the blend involved. By UV-weathering, it was seen that thermal conductivity for PMMA increased with UV-weathering up to (30hr) then decreased, that was attributed to rigidity and defect formation, respectively. For 30%PS/PMMA, there results showed unsystematic decrease in thermal conductivity, which was attributed to unsystematic degradation. By Rain-weathering, thermal conductivity PS, PMMA, and 30 %PS, PMMA, it was seen systematic decreased in PS and 30 % PS/PMMA thermal conductivity; and systematic decrease in PMMA thermal conductivity. That due to the water diffusion in the samples that created some voids, bubbles, and results in decrease in thermal conductivity. This result was attributed to the decrease in adhesive between the components of polymer systems. The results suggested that the samples involved could be used for packaging application.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreInduced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H2O2 concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique
<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIn this research an Artificial Neural Network (ANN) technique was applied for the prediction of Ryznar Index (RI) of the flowing water from WTPs in Al-Karakh side (left side) in Baghdad city for year 2013. Three models (ANN1, ANN2 and ANN3) have been developed and tested using data from Baghdad Mayoralty (Amanat Baghdad) including drinking water quality for the period 2004 to 2013. The results indicate that it is quite possible to use an artificial neural networks in predicting the stability index (RI) with a good degree of accuracy. Where ANN 2 model could be used to predict RI for the effluents from Al-Karakh, Al-Qadisiya and Al-Karama WTPs as the highest correlation coefficient were obtained 92.4, 82.9 and 79.1% respectively. For
... Show MoreThis study is concerned with the effect of adding two kinds of ceramic materials on the mechanical properties of (Al-7%Si- 0.3%Mg) alloy, which are zirconia with particle size (20μm > P.S ≥ 0.1μm) and alumina with particle size (20μm > P.S ≥ 0.1μm) and adding them to the alloy with weight ratios (0.2, 0.4, 0.6, 0.8 and 1%). Stirring casting method has been used to make composite material by using vortex technique which is used to pull the particles to inside the melted metals and distributed them homogenously.
After that solution treatment was done to the samples at (520ºC) and artificial ageing at (170ºC) in different times, it has been noticed that the values of hardness is increased with the aging time of the o
... Show More