The present calculation covers the building shield during irradiation process and under water storage of three milion curries Cobalt-60 radiation source the calculation results in design requirement of 8m depth of water in the source stoeage pool
The Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show MoreIn this paper, an Anti-Disturbance Compensator is suggested for the stabilization of a 6-DoF quadrotor Unmanned Aerial vehicle (UAV) system, namely, the Improved Active Disturbance Rejection Control (IADRC). The proposed Control Scheme rejects the disturbances subjected to this system and eliminates the effect of the uncertainties that the quadrotor system exhibits. The complete nonlinear mathematical model of the 6-DoF quadrotor UAV system has been used to design the four ADRCs units for the attitude and altitude stabilization. Stability analysis has been demonstrated for the Linear Extended State Observer (LESO) of each IADRC unit and the overall closed-loop system using Hurwitz stability criterion. A minimization to a
... Show MoreThis research prepared polymer blend contains from epoxy resin (Ep) and polyurethane
)Pu) as a matrix material of percentage (90 %) from epoxy and ) 10 (% polyurethane and
reinforced by PVC fibers and aluminum fibers two dimension knitted mat with fractional
volume(15 %), and study impact strength before and after reinforcing at temperatures of
(20,40,60(
o
CØŒand the results have shown that the reinforcing matrix materials by fibers
increased impact strength values that rise from(3.387kJ/m2) to (151.62kJ/m2) of composite
material (Ep+Pu+PVC(and thus ) Ep+Pu+PVC+Al.F) at last (Ep+Pu+Al.F (. following
composite material so that temperatures increase led to rise impact strength values except the
polymer
Freedom of opinion and expression occupy the first place among the concerns of countries and international organizations. And it is also the basis of contemporary freedom because it is the foundation for achieving freedom in other fields such as politics, economics, education, etc.. The constitutions of the state have ensured that almost the entire freedom to express an opinion in all its forms either orally or writing or images of expressions, but these freedoms are identified within the law. Most countries announced their commitment to the international conventions and texts issued by international and regional organization like the Universal Declaration of Human Rights in 1948, and the International Covenant on Civil and Political Rig
... Show MoreThe goal of the research is to find the optimization in the test of the appropriate cross-over design for the experiment that the researcher is carrying out (under assumption that there are carry-over effects of the treatments) to posterior periods after the application period (which is often assumed to be the first period). The comparison between the double cross-over design and the cross-over design with extra period. The similarities and differences between the two designs were studied by measuring the Relative Efficiency (RE) of the experiment.
Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More