Experimental results on harmonic distortions in 13.56 MHz RF Argon glow discharge using different grounded electrodes areas and electrodes spacing are presented. The experiment is carried out at four pressure values. RF power values used are between 20 and 90 watts. The results indicate significant increase in distortions at two specific values of the cone angle enclosing the two electrodes within its geometrical volume. The computation of the cone head angle gave the symmetry discharge or asymmetry as well as when the angle is small the condition is near symmetry discharge associated with decrease in the nonlinearity.
The present study attempts to give a detailed discussion and analysis of parenthetical constructions in English and Arabic, the aim being to pinpoint the points of similarity and difference between the two languages in this particular linguistic area.The study claims that various types of constructions in English and Arabic could be considered parenthetical; these include non-restrictive relative clauses, non-restrictive appositives, comment clauses, vocatives, interjections, among others. These are going to be identified, classified, and analyzed according to the Quirk grammar - the approach to grammatical description pioneered by Randolph Quirk and his associates, and published in a series of reference grammars during the 1970
... Show MoreThe architecture of the richly decorated mosques demonstrated that the Islamic culture is one of the most significant and greatest civilizations in the history of humanity. The plant decorative units are one of the key areas in which the Muslim artist excelled. As a result, he created various plant forms that he took from nature, which led him to invent the arabesque art consisting of plant motifs with curved and rounded lines or wrapped between them. These shapes with curved borders include leaves, twigs, and flowers. Buildings and artefacts from the nineteenth century AD have this shape. they achieved their objectives during the twelfth and thirteenth centuries. There was another kind of vegetable decorative unit, made up of stems and
... Show MoreBackground The escalating global concern over increased body weight in adolescents, coupled with the rising rates of adolescent pregnancy worldwide, presents a significant challenge to healthcare systems. We plan to identify the maternal and neonatal consequences associated with pre-pregnancy overweight in adolescent women. Methods Throughout five years, all singleton adolescent pregnant women with pre-pregnancy self-reported body mass index (BMI) of 18.5– ≤ 29.9 were involved during the first-trimester visit. Two groups were generated: overweight and appropriate-weight (BMI 25–29.9 and 18.5–24.9, respectively). Obstetric and neonatal outcomes were observed prospectively and statistically adjusted for the confounding factors.
... Show MoreThe artistic signature of calligraphers has been regarded as a significant aspect of Arabic calligraphy since its inception. As the art form evolved and acquired an aesthetic dimension, the artistic signature became an integral part of this dimension. The calligrapher failed to include his name on the frames, a practice that has become customary among calligraphers nowadays. This tradition allowed to trace the evolution of Arabic calligraphy and identify certain gaps in the calligraphy composition. Additionally, the inclusion of calligrapher's name contributes to the achievement of visual balance within the calligraphy composition, signifying consistency or formal separation. The current study concentrated to investigate the aesthet
... Show MoreThe study was conducted on twenty dogs from variety breeds to estimate the
incidence of tumor mass and determine the risk factors of survey to cases of a year
in veterinary hospital in Baghdad. The most common clinical signs were, ulceration,
bleeding into lesions in addition to drowsiness, anorexia, fever and the others were
depended tumor's location in dog's body like lameness, lacrimation and bloody
constipation etc.
The results showed 70% of the infected dogs were working with military forces
and 30% of them were pet dogs and we found that the highest percentage of tumor
accrued in dogs aged more than 10 years and the females recorded 60% of infection.
Terrier breed had the highest percentage of infection (
Charge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show MoreThe primary aim of this paper, is to introduce the rough probability from topological view. We used the Gm-topological spaces which result from the digraph on the stochastic approximation spaces to upper and lower distribution functions, the upper and lower mathematical expectations, the upper and lower variances, the upper and lower standard deviation and the upper and lower r th moment. Different levels for those concepts are introduced, also we introduced some results based upon those concepts.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More