The study aims to investigate the effect of Al2O3 and Al additions to Nickel-base superalloys as a coating layer on oxidation resistance, and structural behavior of nickel superalloys such as IN 738 LC. Nickel-base superalloys are popular as base materials for hot components in industrial gas turbines such as blades due to their superior mechanical performance and high-temperature oxidation resistance, but the combustion gases' existence generates hot oxidation at high temperatures for long durations of time, resulting in corrosion of turbine blades which lead to massive economic losses. Turbine blades used in Iraqi electrical gas power stations require costly maintenance using traditional processes regularly. These blades are made of nickel superalloys such as IN 738 LC(Inconel 738). Few scientists investigated the impact of Al2O3 or Al additions to Nickel-base superalloys as coating layer by using the slurry coating method on oxidation resistance to enhance the Nickel-base superalloy's oxidation resistance. In this study, IN 738 LC is coated with two different coating percentages, the first being (10 Al+90 Al2O3) and the second being (40 Al+60 Al2O3). Scanning Electron Microscope (SEM) and X-Ray Diffraction (XRD) were performed on all samples before and after oxidation. According to the results, SEM images of the surface revealed that the layer of the surface has a relatively moderated porosity value and that some of the coating layers contain micro-cracks. The best surface roughness of specimens coated with 60 % alumina+40 % aluminum was 5.752 nm. Whereas, the surface roughness of specimens coated with 90 % alumina+10 % aluminum was 6.367 nm.Results reveal that alloys with both Al2O3 and Al additions have reported a positive synergistic effect of the Al2O3and Al additions on oxidation resistance. Moreover,the NiCrAl2O3 thermal coating has good oxidation resistance and the effective temperature of anti-oxidation is raised to 1100 °C in turn reducing the maintenance period of turbine blades
Median filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreHemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to
... Show MoreThis paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.
This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.