This work is devoted to the modeling of streamer discharge, propagation in liquid dielectrics (water) gap using the bubble theory. This of the electrical discharge (streamer) propagating within a dielectric liquid subjected to a divergent electric field, using finite element method (in two dimensions). Solution of Laplace's equation governs the voltage and electric field distributions within the configuration, the electrode configuration a point (pin) - plane configuration, the plasma channels were followed, step to step. The results show that, the electrical discharge (streamer) indicates the breakdown voltage required for a 3mm atmospheric pressure dielectric liquid gap as 13 kV. Also, the electric potential and field distributions shown agreement with the streamer growth, according to the simulation development time.
Abstract
The purpose of our study was to develop Dabigatran Etexilate loaded nanostructured lipid carriers (DE-NLCs) using Glyceryl monostearate and Oleic acid as lipid matrix, and to estimate the potential of the developed delivery system to improve oral absorption of low bioavailability drug, different Oleic acid ratios effect on particle size, zeta potential, entrapment efficiency and loading capacity were studied, the optimized DE-NLCs shows a particle size within the nanorange, the zeta potential (ZP) was 33.81±0.73mV with drug entrapment efficiency (EE%) of 92.42±2.31% and a loading capacity (DL%) of 7.69±0.17%. about 92% of drug was released in 24hr in a controlled manner, the ex-vivo intestinal p
... Show MoreIn recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThis work involved the co-substitution of the two bioactive ions of strontium and magnesium into the hydroxyapatite (HA) coating which was then electrochemically deposited on Ti-6Al-4V ELI dental alloy (Gr.23) before and after treatment by Micro Arc Oxidation (MAO). The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of the coating layer was estimated by using pull-off adhesion test. The adhesion strength of Sr/Mg-HA on the Ti-6Al-4V ELI dental alloy after MAO treatment was 1.79 MPa, which was higher than that before MAO treatment (1.62 MPa). The corrosion behavior of th
... Show MoreIn the current work, the mixing ratios ( 𝛿 ) of gamma transitions were calculated from energy levels in the isotopes neodymium 60𝑁𝑎 142−150 populated in the 60Nd 142− 150 (n, n ˊγ) 60Nd 142− 150 using the 𝑎2 ratio method. We used the experimental coefficient (𝑎2 ) for two γ-transitions from the initial state itself, the statistical tensor 𝜌2(𝐽𝑖), associated with factor 𝑎2 , would be the same for the two transitions. The results obtained are in good agreement or within the experimental error with -those previously published. And existing contradictions resulting from inaccuracies in the empirical results of previous work. The current results confirm that the , 𝑎2 − method is used to calculate th
... Show MoreBackground: Painful elbow joint over the lateral epicondyle especially with resisted wrist extension are common signs of lateral epicondyle tendinopathy, also called tennis elbow.
Objective: To evaluate the clinical outcome of local platelet rich plasma (PRP) injection in patients with chronic tennis elbow compared with a steroid (Depomedrol 40 mg) injection.
Methods: A total of 88 patients with chronic tennis elbow were treated at Al-Kindy Teaching Hospital and private clinics. All patients had chronic pain for about 24 weeks or more and had failed first line treatment. The patients dividing into two groups, Group A injected with PRP (n = 44), and group B injected with d
... Show MoreIn this paper simulation technique plays a vital role to compare between two approaches Maximum Likelihood method and Developed Least Square method to estimate the parameters of Frechet Poisson Lindley Distribution Compound. by coding using Matlab software program. Also, under different sample sizes via mean square error. As the results which obtain that Maximum Likelihood Estimation method is better than Developed Least Square method to estimate these parameters to the proposed distribution.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreMethicillin resistant Staphylococcus aureus (MRSA) is one of the principal nosocomial causative agents. This bacterium has the capability to resist wide range of antibiotics and it is responsible for many diseases like skin, nose and wounds infection. In this study, randomly amplified polymorphic DNA (RAPD)-PCR was applied with ten random primers to examine the molecular diversity among methicillin resistant Staphylococcus aureus (MRSA) isolates in the hospitals and to investigate the genetic distance between them. 90 Isolates were collected from clinical specimens from Iraqi hospitals for a total of 90 isolates. Only 10 strains (11.11%) were found to be MRSA. From these 10 primers, only 9 gave clear amplification products. 91 fragment l
... Show MoreThe ï¤- Multiple mixing ratios of ï§-transitions from levels of 56Fe populated in 56 56 ( , ) Fe n n Fe ï§ ï‚¢ reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitionsØŒ in our work we used This method for mixed ï§ - transitions in addition to pure ï§ - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet ï¤- values. It is clear from the results that the ï¤- values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur
... Show More