A preventing shield for neutrons and gamma rays was designed using alternate layers of water and iron with pre-fixed dimensions in order to study the possibility of attenuating both neutrons and gamma-rays. ANISN CODE was prepared and adapted for the shield calculation using radiation doses calculation: Two groups of cross-section were used for each of neutrons and gamma-rays that rely on the one – dimensional transport equation using discrete ordinate's method, and through transforming cross-section values to values that are independent on the number of groups. The memory size required for the applied code was reduced and the results obtained were in agreement with those of standard acceptable document samples of cross –section, this a
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThin films of pure tin mono-sulfide SnS and tin mono-sulfide for (1,2,3,4)% fluorine SnS:F with Thicknesses of (0.85 ±0.05) ?m and (0.45±0.05) ?m respectively were prepared by chemical spray pyrolysis technique. the effect of doping of F on structural and optical properties has been studied. X-Ray diffraction analysis showed that the prepared films were polycrystalline with orthorhombic structure. It was found that doping increased the intensity of diffraction peaks. Optical properties of all samples were studied by recording the absorption and transmission spectrum in range of wave lengths (300-900) nm. The optical energy gap for direct forbidden transi
... Show MoreThe formal investigation of the interior spaces of the residential bedrooms for children with autism is one of the basic tasks that should be known by the interior designer. Achieving an atmosphere compatible with his health condition, which contributes to generating a sense of spatial intimacy through the design dimension provided by the interior designer and his tireless endeavor to meet the needs of the child in an internal environment that achieves the functional dimension and spiritual approaches that enhance the child’s sense of spatial belonging and contribute to improving his mood and this positively reflects on his behavior and social integration. The current research has reached the most important design criteria that must be
... Show MoreThe aim of the research is to measure the relationship and effect of the application of total production maintenance TPM in the operational strategy, as it is considered one of the most important strategies for the process of restoring production losses because of inefficient equipment. Competitive edge in the global market by upgrading the operational strategies of OS in the application of TPM in those institutions that apply both H-OS-oriented and P-OS-oriented strategies where the strategy has been identified as a critical success factor. The aim of this study is to attempt to consider the application of comprehensive productive maintenance in industrial establishments
Construction project life-cycle processes must be managed in a more effective and predictable way to meet project stakeholder needs , However, there is increasing concern about whether know-how effectively improves understanding of underlying theories of project management processes for construction organizations and their project managers Project planning and scheduling are considered as key and challenging tools in controlling and monitoring project performance , but many worldwide construction projects appear to give insufficient attention to effective management and definition of project planning, including pre planning stages . Indeed, some planning issues indeed, some planning issues have been completely ove
... Show More