The major goal of this research was to use the Euler method to determine the best starting value for eccentricity. Various heights were chosen for satellites that were affected by atmospheric drag. It was explained how to turn the position and velocity components into orbital elements. Also, Euler integration method was explained. The results indicated that the drag is deviated the satellite trajectory from a keplerian orbit. As a result, the Keplerian orbital elements alter throughout time. Additionally, the current analysis showed that Euler method could only be used for low Earth orbits between (100 and 500) km and very small eccentricity (e = 0.001).
Iraqi crude Atmospheric residual fraction supplied from al-Dura refinery was treated to remove metals contaminants by solvent extraction method, with various hydrocarbon solvents and concentrations. The extraction method using three different type solvent (n-hexane, n-heptane, and light naphtha) were found to be effective for removal of oil-soluble metals from heavy atmospheric residual fraction. Different solvents with using three different hydrocarbon solvents (n-hexane, n-heptane, and light naphtha) .different variables were studied solvent/oil ratios (4/1, 8/1, 10/1, 12/1, and 15/1), different intervals of perceptual (15, 30-60, 90 and 120 min) and different temperature (30, 45, 60 and 90 °C) were used. The metals removal perce
... Show MoreImproving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
Multispectral remote sensing image segmentation can be achieved using a multithresholding technique. This paper studies the effect of changing the window size of the two dimensional (2D) fast Otsu algorithm that presented by Zhang. From the results, it shown that this method behaves as a search machine for the valleys (an automatic threshold), between the gray levels of the histogram with changing the size of slide window.
Keywords Image Segmentation, (2D) Fast Otsu method, Multithresholding, Automatic thresholding, (2D) histogram image.
The diagnosis of acute appendicitis (AA) sometimes is illusive and the accompanying clinical and laboratory manifestations cannot be used for definitive diagnosis. Objective: This study aimed to evaluate the diagnostic value of neutrophil/lymphocyte ratio (NLR) in detection of AA. Materials and Methods: This is a cross-sectional study that included a total of 80 adult patients with AA and 62 age- and gender-matched patients with abdominal pain due to causes other than AA. Three milliliter of peripheral blood were collected from each participant. The NLR was calculated by dividing the absolute neutrophil count by the absolute lymphocyte count. Receiver operating characteristic curve was used to assess the diagnostic value of NLR in detection
... Show MoreThe present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreA new, simple, sensitive and fast developed method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation a burgundy color complex between methyldopa andammonium ceric (IV) nitrate in aqueous medium using long distance chasing photometer NAG-ADF-300-2. The linear range for calibration graph was 0.05-8.3 mmol/L for cell A and 0.1-8.5 mmol/L for cell B, and LOD 952.8000 ng /200 µL for cell A and 3.3348 µg /200 µL for cell B respectively with correlation coefficient (r) 0.9994 for cell A and 0.9991 for cell B, RSD % was lower than 1 % for n=8. The results were compared with classical method UV-Spectrophotometric at λ max=280 n
... Show More