The Indian costus plasma properties are investigated including electron temperature (Te), "electron density (ne)", "plasma frequency (fp)", " Debye sphere length", and amount of Debye(Nd), using the spectrum of optical emission technique. There are several energies used, with ranging from 300 to 600 mJ. The Boltzmann Plot is used to calculate the temperature; where as Stark's Line Broadening is used to calculate the electron density. The Indian costus was spectroscopically examined in the air with the laser at 10 cm away from the target and the optical fiber at 0.5 cm away. The results were obtained for an electron temperature range of (1.8-2.2) electron volts (ev) and a wavelength range of (300-600) nm. The XRF analysis reveals that the Indian costus contains a variety of minerals, each with a different percentage, which explains why the optical emission spectrum has so many peaks. When the laser energy is (between 300 and 600 mJ) the "optical emission spectroscopy (OES) "has been used to analyze the plasma spectrum of the Indian costus in the air. The results shows that as the laser energy grew, the amount of Debye will be greater i-e (Nd) >>>1, which is one of the plasma properties.
The growing phenomenon of drug abuse in light of the increasing psychological and social pressures experienced by members of the community of wars and crises of the Iraqi society in the middle of the last decade was Andv societies that are free of the phenomenon of drug addiction, but with a high level events, wars and economic crises and the deterioration of the situation security and lack of control on the border with the neighboring countries, it has become a breeding ground and the focus of drug-smuggling gangs, all of which led to the spread of drug abuse, especially among the youth category, and undoubtedly the seriousness of drug abuse Taatmd negative community impacts, Valmtaati drug becomes a member unproductive and unable to ea
... Show MoreLight has already becomes a popular means of communication, and the high-bandwidth data into free space without the use of wires. A great idea took us to design a new system for transmitting sound through free space at (650, 532) nm wavelengths using reflective mirrors under different atmospheric conditions. The study showed us the effect of various weather factors (temperature, wind speed and humidity) on these wavelengths for different distances. As well as studying the attenuation caused by long-distance laser and beam divergence, A reflective dish was used to focus the spot of the laser beam on the photocell. Results were discussed under the effect of these factors and the attenuation resulting from the beam divergence. Thus, the sys
... Show MoreAbu Al- Qasim Qa ,im Maqam is famous figure in political life of lranian; The life of Abu Al- Qasim Qa ,im Maqam is full of incidents and conflicts in the period of the expansion of foreign influence in lran Abu Al- Qasim Qa ,im Maqam has an important role in the history of Iran Modern political considered him one of the most prominent leaders to the unified Arabian nationalistic liberating Abu Al- Qasim Qa ,im Maqam raised in the history of the Qajar .
In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
This paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.
The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreThe research deals with Environmental Management and how to develop its programs with the use of Knowledge Management, the environmental programs that integrate with processes can add strategic value to business through improving rates of resource utilization , efficiencies , reduce waste, use risk management, cut costs, avoid fines and reduce insurance. All these activities and processes can improve it through knowledge management, the optimal usage for all organizations information , employ it in high value and share it among all organizations members who involves in modify its strategy . Choosing suitable environmental management information system, develop it and modify it with organization processes, can greatly serve the en
... Show MoreThis paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More