In this research constructed N2 laser system by use developed method of electric discharge. In this method used four step of electric discharge by using four capacitors, three spark gaps, high tension power supply varying in range from 12kV to 24 kV and three resistors, this method called three stage blumlein circuit. The breakdown time delay of these parallel spark gaps cement strong ultraviolet preionization in the laser channel, thus the result of these amendments the laser output is many doubled and is more increasing than that obtained using the one and two stage blumlein circuits. This system has been designed and operated to give pulse laser with wavelength at 337.1 nm. This laser system can operate without mirrors and optical resonator. The best result of energy was about (20.2 mJ) at electrode separation (3.5 mm) with flow rate (13 L/min) and applied voltage (24 kV). With this conditions of electric discharges the pulse duration was (6.65 ns) then the peak power was (3.04 MW), the efficiency of convert the electric energy to optical energy was (0. 93%) and The divergence of laser beam at optimal condition was (0.348 mrad). The results of fabricated system indicate the output characteristics can be significantly improved by improving the discharge characteristics.
Doxycycline hyclate is an antibiotic drug with a broad‐spectrum activity against a variety of gram‐positive and gram‐negative bacteria and is frequently used as a pharmacological agent and as an effector molecule in an inducible gene expression system. A sensitive, reliable and fast spectrophotometric method for the determination of doxycycline hyclate in pure and pharmaceutical formulations has been developed using flow injection analysis (FIA) and batch procedures. The proposed method is based on the reaction between the chromogenic reagent (V4+) and doxycycline hyclate in a neutral medium, resulting in the formation of a yellow compound that shows maximum absorbance at 3
In the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative char
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.
This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.