Non thermal argon plasma needle at atmospheric pressure was constructed. The experimental set up was based on simple and low cost electric components that generate electrical field sufficiently high at the electrodes to ionize various gases which flow at atmospheric pressure. A high AC power supply was used with 9.6kV peak to peak and 33kHz frequency. The plasma was generated using two electrodes. The voltage and current discharge waveform were measured. The temperature of Ar gas plasma jet at different gas flow rate and distances from the plasma electrode was also recorded. It was found that the temperature increased with increasing frequency to reach the maximum value at 15 kHz, and that the current leading the voltage, which demonstra
... Show MoreThis search study the effect of particle size of graphite on the mechanical and thermal properties of epoxy composites, where graphite adopted with particle sizes (45,53,75) ?m, respectively, and the percentages by weight (0,1,3,5,7,9)% for each size of this three particle sizes.Mechanical properties represented by the bending (three-point bending) and through which the conclusion is bending stress and modulus of elasticity, thermal properties were either through thermal conductivity tests.The results showed that the ratio(1%) is the maximum value of bending stress at the three particle size and the (45 ?m) is the maximum.Thermal conductivity result show is the maximum value at ratio (1%) of particle size(53 ?m)
This work deals with thermal cracking of slack wax produced as a byproduct from solvent dewaxing process of medium lubricating oil fraction in AL-Dura refinery. The thermal cracking process was carried out at a temperature ranges 480-540 ºC and atmospheric pressure. The liquid hourly space velocity (LHSV) for thermal cracking was varied between 1.0-2.5 . It was found that the conversion increased (61 - 83) with the increasing of reaction temperature (480 - 540) and decreased (83 - 63) with the increasing of liquid hourly space velocity (1.0 - 2.5).
The maximum gasoline yield obtained by thermal cracking process (48.52 wt. % of feed) was obtained at 500 ºC and liquid hour space velocity 1 . The obtaining liquid product at the best op
The production of fission products during reactor operation has a very important effect on reactor reactivity .Results of neutron cross section evaluations are presented for the main product nuclides considered as being the most important for reactor calculation and burn-up consideration . Data from the main international libraries considered as containing the most up-to-date nuclear data and the latest experimental measurements are considered in the evaluation processes, we describe the evaluated cross sections of the fission product nuclides by making inter comparison of the data and point out the discrepancies among libraries.
Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreAdvances in gamma imaging technology mean that is now technologically feasible to conduct stereoscopic gamma imaging in a hand-held unit. This paper derives an analytical model for stereoscopic pinhole imaging which can be used to predict performance for a wide range of camera configurations. Investigation of this concept through Monte Carlo and benchtop studies, for an example configuration, shows camera-source distance measurements with a mean deviation between calculated and actual distances of <5 mm for imaging distances of 50–250 mm. By combining this technique with stereoscopic optical imaging, we are then able to calculate the depth of a radioisotope source beneath a surfa
In this paper, the combined source coding with Multi Carrier Code Division Multiple Access (MC-CDMA) system is proposed, where the transmission of the compressed image produced from source coding through Additive White Gaussian Noise (AWGN) channel for a single user and multi users. In which the (MC-CDMA) system removes Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI). The hybrid compression system of Discrete Cosine Transform (DCT) and predictive coding (PC) technique are integrated as a source coding. The simulation results indicates that the transmission system of a single user was much better than the transmission system of multi users. When the number of users increased, the Bit Error Rate (BER) increased. For a
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More