The influence of 5-10 kHz audio frequency on the power dissipation in ac discharge of argon gas was studied experimentally, at pressures 50-80 mTorr and electrodes separation 10 cm (pd range 0.5-0.8 Torr.
cm). The measurements have shown that the discharge behavior in the ac circuit is equivalent to a series RC circuit. It is observed that the variation curve of discharge power P with the frequency f is approximately has a Gaussian shape. It is also observed that the curve of Pm- pd is the inverse of Paschen curve, where Pm is the maximum power in the frequency range. The time of breakdown is estimated from the curve of P- f.
The unprejudiced of this education is to gauge the ability of the retinoic acid to induce apoptotic cell death in hematological tumors through caspase dependent or independent apoptotic pathway, The cytotoxicity effects of retinoic acid of different concentrations (400,350,300,250,200,150,100,50,25,12.5 μg\ml) and exposure for all hematological malignancy cell lines (Human non-Hodgkin lymphoma SR and human multiple myeloma (COLO 677) and Human Monocytic Leukemia THP1 and Acute promyelocytic leukemia NB4) have been determined using a microtetrazolium (MTT) assay. Propodeum iodide and alcidine orange (AO/PI) paired discoloration was used to study the ability of retinoic acid to induce apoptosis in the infected cells and examined under fluore
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreFine art represents part of society's culture. The development of art was accompanied by the penetration of new worlds known as the fourth dimension. After art entered the boundaries of geometry and reduction; He began to break into the absurd, and the form and philosophy of art changed, moving from modernity to what came after it to contemporary. Transforming from a formal form into a symbolic form with philosophical implications linked to the light, audio and kinetic effects as they embody time, the concept became the master of the idea. The research aims to identify the concept of time and its types, then the philosophical concept of time and its reflection on contemporary art, through the analytical study of a selection of contempora
... Show MoreAbstract:In this paper, some probability characteristics functions (moments, variances,convariance, and spectral density functions) are found depending upon the smallestvariance of the solution of some stochastic Fredholm integral equation contains as aknown function, the sine wave function
|
Background: Repeated blood transfusion is the main therapeutic option for transfusion-dependent anaemias with consequent iron overload and organ damage .Therefore iron chelating agents are important protective measures for these patients. The aim of this study was to investigate the efficiency and safety of Desferroxamine in paediatrics population subjected to iron overload as a consequence of repeated transfusion in a group of Sudanese children Subjects & Methods: This was a descriptive cross-sectional hospital based study. Conducted in two main paediatric reference hospitals in, Su |
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreSpace is considered as an important element in constructing artwork, it can be a dominant and fulfilled part that adds new existence to the content. Each artwork must have a space artistically or analytically. The internal and eternal space of artwork have associated with each other in order to be ann important connected unit that establishes the work epressions and helps the audience to understand it. Such kind of works can be represented by the works of the potter (Sheinyor Abdu Allah) which have uarious expressions of space which this study is based on.The study aims at finding out the treatment of apace in the ceramic sculpture works of the potter (Sheinyar Abdu Allah).The second chapter has many sections. T
... Show More