Innovation of Mechanical Practice Model using Virtual Reality Technology and Pilot Butt Welding technique in Flat Position
Abstract
Metal welding is one of the indispensable jobs in daily practice. Nowadays, there are many different welding techniques and methods depending on the object/metal to be welded. This article focuses on studying the principle of butt welding technique of metal plates in the flat position using traditional tools, machinery and equipment, thereby proposing a solution to innovate the practice model of butt welding technique in the flat position with the traditional method on real equipment to the practice method on virtual reality technology. Accordingly, the practical method will design and build 3D models of traditional equipment, tools, and instruments such as soldering irons, current regulators, metal iron blanks, protective gear, etc. using 3D graphic design technologies such as Unity 3D, Maya 3D, 3Ds Max, etc. and build virtual simulation exercises of the metal welding process in the form of a visual virtual reality model using the OpenSG graphics library and C# programming languages. The results of the article will build a virtual reality practice model for butt welding metal plates in a flat position with instructions for automatically explaining each step of the metal welding process. At the same time, the article will also provide assessments and analysis of the quality of the practice exercises at vocational training institutions in Thai Nguyen province.
References
V. Rijmen and J. Daemen, “Advanced encryption standard,” in Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technol- ogy, vol. 19, 2001, p. 22.
W. I. Alsobky and H. Saeed, “Different types of attacks on block ciphers,” International Journal of Recent Technology and Engineering (IJRTE), vol. 9, no. 3, pp. 28–31, 2020.
L. T. Thi, “Enhancing the security of aes block cipher based on modified mixcolumn,” Journal of Computer Science and Cybernetics, vol. 40, no. 2, pp. 187–203, 2024.
T. T. Luong and H. D. Linh, “Generating key-dependent involutory mds matrices through permutations, direct expo- nentiation, and scalar multiplication,” International Journal of Information and Computer Security, vol. 23, no. 4, pp. 410–432, 2024.
L. D. Hoang and L. T. T. Thi, “Enhancing block cipher security with key-dependent random xor tables generated via hadamard matrices and sudoku game,” Journal of Intelligent & Fuzzy Systems, 2024, (Preprint), 1–17.
T. T. Luong, N. V. Long, and B. Vo, “Efficient implemen- tation of the linear layer of block ciphers with large mds matrices based on a new lookup table technique,” PLOS ONE, vol. 19, no. 6, p. e0304873, 2024.
U¨ nal C¸ avus¸og˘lu, A. Zengin, I. Pehlivan, and S. Kac¸ar, “A novel approach for strong s-box generation algorithm de- sign based on chaotic scaled zhongtang system,” Nonlinear Dynamics, vol. 87, pp. 1081–1094, 2017.
M. Usama, “An effective method of constructing strong lightweight s-boxes based on combining enhanced logistic and enhanced sine map,” IEEE Transactions on Computers, vol. 14, no. 8, 2021.
F. J. Lumal, “New dynamical key dependent s-box based on chaotic maps,” IOSR Journal, vol. 17, no. 4, pp. 91–101, 2015.
H. S. Alhadawi, M. A. Majid, D. Lambic´ et al., “A novel method of s-box design based on discrete chaotic maps and cuckoo search algorithm,” Multimedia Tools and Applica- tions, vol. 80, pp. 7333–7350, 2021.
I. Hussain, A. Anees, T. A. Al-Maadeed, and M. T. Mustafa, “Construction of s-box based on chaotic map and algebraic structures,” Symmetry, vol. 11, no. 3, pp. 494–501, 2019.
M. Long and L. Wang, “S-box design based on discrete chaotic map and improved artificial bee colony algorithm,” IEEE Access, vol. 9, pp. 86 144–86 154, 2021.
A. H. Saeed, “Development of dna-based dynamic key- dependent block cipher,” Ph.D. dissertation, Universiti Putra Malaysia, 2015, thesis to Graduate Studies for the Degree of Doctor of Philosophy.
F. Artug˘er, “A novel algorithm based on dna coding for substitution box generation problem,” Neural Computing and Applications, vol. 36, pp. 1283–1294, 2023.
A. T. Maolood, A. K. Farhan, W. I. El-Sobky, H. N. Zaky, H. L. Zayed, H. E. Ahmed, and T. O. Diab, “Fast novel efficient s-boxes with expanded dna codes,” Security and Communication Networks, vol. 2023, no. 1, 2023.
P. Agarwal, A. Singh, and A. Kilicman, “Development of key-dependent dynamic s-boxes with dynamic irreducible polynomial and affine constant,” Advances in Mechanical Engineering, vol. 10, no. 7, pp. 1–18, 2018.
U. Waqas, S. Afzal, M. A. Mir, and M. Yousaf, “Generation of aes like s-boxes by replacing affine matrix,” in 12th Inter- national Conference on Frontiers of Information Technology, 2014, pp. 159–164.
H. T. Assafli and I. A. Hashim, “Generation and evaluation of a new time-dependent dynamic s-box algorithm for aes block cipher cryptosystems,” in 3rd International Confer- ence on Recent Innovations in Engineering (ICRIE 2020), Materials Science and Engineering, 2020.
M. Dara and K. Manochehri, “Using rc4 and aes key schedule to generate dynamic s-box in aes,” Information Security Journal: A Global Perspective, vol. 23, no. 1-2, 2014.
A. I. Salih, A. Alabaichi, and A. S. Abbas, “A novel approach for enhancing security of aes using private xor table and 3d chaotic regarding to software quality factor,” ICIC Express Letters Part B: Applications, vol. 10, no. 9, pp. 1574–1581, 2019.
B. Prasetiyo and M. N. Ardian, “Enhancement security aes algorithm using a modification of transformation shiftrows and dynamic s-box,” in Journal of Physics: Conference Series, vol. 1567, no. 3, 2020, p. 032025.
T. T. Luong, N. N. Cuong, and B. Vo, “Aes security improvement by utilizing new key-dependent xor tables,” IEEE Access, pp. 53 158–53 177, 2024.
J. Daemen et al., “Aes proposal: Rijndael,” Katholieke Universiteit Leuven, ESAT-COSIC, Tech. Rep., 1999.
E. R. and R. A. R., “Improving diffusion power of aes rijndael with 8x8 mds matrix,” International Journal of Scientific & Engineering Research, vol. 2, pp. 1–5, 2011.
S. M., D. M., M. H., and O. B., “On construction of invo- lutory mds matrices from vandermonde matrices in gf(2q),” Designs, Codes and Cryptography, vol. 64, no. 3, pp. 287– 308, 2012.
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “The keccak reference, version 3.0,” http://keccak.noekeon.org/ Keccak-reference-3.0.pdf, 2011.
G. Bertoni, J. Daemen, and M. Peeters, “Cryptographic sponge functions,” http://sponge.noekeon.org/CSF-0.1.pdf, 2011.
M. J. Dworkin, “Sha-3 standard: Permutation-based hash and extendable-output functions,” National Institute of Standards and Technology, Tech. Rep., 2015.
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, “A statistical test suite for random and pseudorandom number generators for cryptographic applica- tions,” NIST, Tech. Rep., 2010.
A. I. Salih and A. A. A. Y. T., “Enhancing aes security based on dual dynamic xor table and mixcolumns transformation,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 3, pp. 1574–1581, 2020.
L. H. Dinh, L. T. Thi, and L. N. Van, “On the mathematical aspects of cryptographic randomness tests using discrete fourier transform,” in 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024, pp. 1–6.
