The study deals with reactivity insertion linear and non linear and/or Ramp reactivity expressed as a polynomial in time in the presence of two Feedback mechanisms, using the neutronic-thermohydraulic coupling in order to predict the neutron behavior as a function of time in terms of reactor power. Also, a comparative study has been achieved in the case of the presence of the feedback mechanisms. Insertion of Ramp reactivities in terms of polynomial in time to study the behavior of power and reactivity as a function of time in the presence of two feedback mechanisms (fuel and coolant) has been carried out and the results are displayed as plots, and showed this results corresponding with international results. The present study shows that the simulation of neutron time behavior is a vital tool to predict the behavior of reactivity and/or power as a function of time in case of insertion of negative or positive and/or Ramp reactivities in power reactor core for the case including feedback mechanism. Also, the simulation may be considered a unique technique to predict unexpected incident and/or accident that may occur in reactor power core in case of the availability of accurated input data.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreGeomorphology is concerned with the topographic units that make up the Earth's surface. These take many forms, such as mountains and rivers, and include many dangers such as landslides, landslides and erosion. Many studies appeared in this field to analyze its effects and risks resulting from it, including urban studies, to determine the trends of optimal urban expansion and its geomorphological interactions. The results showed that the city of Kut originated and expanded near the course of the Tigris River and its branches, and it suffers from unbalanced urban expansion, due to the high rate of population growth, and overcrowding in housing units with the growth of urban land uses in it, which prompted the city to extend horizontally and v
... Show MoreThe subject of the Internet of Things is very important, especially at present, which is why it has attracted the attention of researchers and scientists due to its importance in human life. Through it, a person can do several things easily, accurately, and in an organized manner. The research addressed important topics, the most important of which are the concept of the Internet of Things, the history of its emergence and development, the reasons for its interest and importance, and its most prominent advantages and characteristics. The research sheds light on the structure of the Internet of Things, its structural components, and its most important components. The research dealt with the most important search engines in the Intern
... Show MoreThe research attempts to diagnose the level of the effect of human resources flexibility (employees skills flexibility, employees behaviors flexibility, and human resource practice flexibility) in the south al-rusafa directorate of a power station one of the formations and the Ministry of Electricity, and impact of a range of variables related to the performance operational, namely, (efficiency, effectiveness)recognizing the importance of the subjects studied,& because of the importance of expected results of the field under consideration,researcher selected a sample of size (121) engineers and technicians of workers in the directorate. Was my hypotheses the major search of a relationship and impact between human resources flex
... Show More