ABSTRACT Planetary Nebulae (PN) distances represent the fundamental parameter for the determination the physical properties of the central star of PN. In this paper the distances scale to Planetary Nebulae in the Galactic bulge were calculated re- lated to previous distances scales. The proposed distance scale was done by recalibrated the previous distance scale technique CKS/D82. This scale limited for nearby PN (D ≤ 3.5 kpc), so the surface fluxes less than other distance scales. With these criteria the results showed that the proposed distance scale is more accurate than other scales related to the observations for adopted sample of PN distances, also the limit of ionized radius (Rio) for all both optically thick and optically thin in the rang of sizes (0.45 > Rio (pc) > 0.03).
In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
unacceptable social behaviors, particularly withdrawal behavior that appears in children with autism represent a major problem hindering the process of communication with those around them and therefore the process of mergence with them be difficult.
The withdrawal causes a real affect deficit for children with autism limits the possibility of development of their intellectual and mental growth due to their solitude and the weakness of their focus in the acquisition of pedagogical skills and lack the necessary social skills to maintain the relations of friendship and enjoyment of them.
withdrawal children fail to participate
... Show MoreIn this work magnetite/geopolymer composite (MGP) were synthesized using a chemical co-precipitation technique. The synthesized materials were characterized using several techniques such as: “X-ray diffraction (XRD), Fourier-transform infrared spectroscopy (FTIR), vibrating sample-magnetometer (VSM), field-emission scanning electron microscopy (FE-SEM), energy dispersive X-ray spectroscopy (EDS), Brunauer–Emmett–Teller (BET) and Barrentt-Joyner-Halenda (BJH)” to determine the structure and morphology of the obtained material. The analysis indicated that metal oxide predominantly appeared at the shape of the spinel structure of magnetite, and that the presence of nano-magnetite had a substantial impact on the surface area and pore st
... Show MoreThe potential application of granules of brick waste (GBW) as a low-cost sorbent for removal of Ni+2ions from aqueous solutions has been studied. The properties of GBW were determined through several tests such as X-Ray diffraction (XRD), Energy dispersive X-ray (EDX), Scanning electron microscopy (SEM), and BET surface area. In batch tests, the influence of several operating parameters including contact time, initial concentration, agitation speed, and the dose of GBW was investigated. The best values of these parameters that provided maximum removal efficiency of nickel (39.4%) were 1.5 hr, 50 mg/L, 250 rpm, and 1.8 g/100mL, respectively. The adsorption data obtained by batch experiments subjected to the Three i
... Show MoreGas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t
In this paper, the necessary optimality conditions are studied and derived for a new class of the sum of two Caputo–Katugampola fractional derivatives of orders (α, ρ) and( β,ρ) with fixed the final boundary conditions. In the second study, the approximation of the left Caputo-Katugampola fractional derivative was obtained by using the shifted Chebyshev polynomials. We also use the Clenshaw and Curtis formula to approximate the integral from -1 to 1. Further, we find the critical points using the Rayleigh–Ritz method. The obtained approximation of the left fractional Caputo-Katugampola derivatives was added to the algorithm applied to the illustrative example so that we obtained the approximate results for the stat
... Show MoreIn this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show MoreIn this work, we are concerned with how to find an explicit approximate solution (AS) for the telegraph equation of space-fractional order (TESFO) using Sumudu transform method (STM). In this method, the space-fractional order derivatives are defined in the Caputo idea. The Sumudu method (SM) is established to be reliable and accurate. Three examples are discussed to check the applicability and the simplicity of this method. Finally, the Numerical results are tabulated and displayed graphically whenever possible to make comparisons between the AS and exact solution (ES).