In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
A new copolymer (MFA) was prepared from condensation of melamine (M) with p- methyl – anisole (A) in the presence of condensation agent like 37% (w/v) of formaldehyde. The new copolymer was characterized by elemental, IR and HNMR spectra. The chelating ion-exchange property of this polymer was studied for methylene blue dye in aqueous solution in 100-200ppm concentrations. The adsorption study was carried out over a wide range of pH, shaking time and in media of various kinetic parameters models. Thermal parameters like enthalpy, entropy and Gibbs free energy of adsorption process of methylene blue on surface of MFA resin were determined on the basis of kinetic parameters at different temperatures. To describe the equilibrium of adsorp
... Show MoreModern communication and media technology has pioneered new horizons and curried out deep changes in the various fields of social life, It effected enormously human communication as well.
Content one Who late the developments which have effected the social relations ،due to the new media ،especially Face book ,will certainly notice the far cry changes of the social relation net which has been effected ,in a way or another ،the accelerated development ،under the appearance of the so called the virtual society .
Face book has embodied the means – communication ,which has become an important turn point in the social communication .
It is the point the present paper tries to expose an discuss by a field study curried on a sam
In May 20th. 1985 two species of aphids were found on the roots of Vicia faba L. in Hammam region 30 Kilometer south of Mosul. Samples of these aphids were sent to the Commonwealth Institute of Entomology, London. ( No. 17002/9804 Asia ) and identified as being Smynthurodes betas westwood and Dysaphis crataegi (Kaltenbach) (APhididae : Homoptera). The first species was dominant. The latter species was also noticed on the roots of the common bishop's weed (Ammi majus L.) and on the wide carrot (Daucus carrota L.) of the family Umbelliferae (Bodenheimer & Swirski, 1957).
The new complexes including Cu(II), Co(II), Ni(II), Pt(IV), and Pd(II) metals with 4,4'-(((1E,1'E)-1,4-phenylenebis(methaneylylidene))bis(azaneylylidene))bis(5-(4-chlorophenyl)-4H-1,2,4-triazole-3-thione) have been synthesized of utilizing us polystyrene (PS) photostability. The supplement (0,5 w / v%) was for the production of polystyrene ( PS) in the form of tetrahydrofuran (THF). Polystyrene films were exposing irradiation (250 – 380 nm) absorption light intensity of 6.02 x 10-9 ein dm-3 s-1 at room temperature, through the changes that occur to each of viscosity average molecular weight (Mv), main chain scission (S), degree of polymerization (DPn), weight loss %, hydroxyl index (lOH), carbonyl index (ICo) determined the photo stabiliz
... Show MoreAbstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between th
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show More