This work presents a computer studying to simulate the charging process of a dust grain immersed in plasma with negative ions. The study based on the discrete charging model. The model was developed to take into account the effect of negative ions on charging process of dust grain.
The model was translated to a numerical calculation by using computer programs. The program of model has been written with FORTRAN programming language to calculate the charging process for a dust particle in plasma with negative ion, the time distribution of a dust charge, number charge equilibrium and charging time for different value of ηe (ratio of number density of electron to number density of positive ion).
A twisted-fin array as an innovative structure for intensifying the charging response of a phase-change material (PCM) within a shell-and-tube storage system is introduced in this work. A three-dimensional model describing the thermal management with charging phase change process in PCM was developed and numerically analyzed by the enthalpy-porosity method using commercial CFD software. Efficacy of the proposed structure of fins for performing better heat communication between the active heating surface and the adjacent layers of PCM was verified via comparing with conventional longitudinal fins within the same design limitations of fin material and volume usage. Optimization of the fin geometric parameters including the pitch, numb
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
In this study the isomerization of desulfuerized light Iraqi petroleum naphtha (Al-Dura Refinery) with boiling point range of 37 to 124 °C , 80.5 API specific gravity and 68.2 octane number has been investigated. Two types of catalysts were prepared (Pt/HX and Pt/SrX) by impregnation of 0.8 wt% Pt on l 3X-zeolite. The catalyst activity and selectivity toward isomerization, and catalyst deactivation were investigated.
The isomerization unit consisted of a vertical tubular stainless steel reactor of 2 cm internal diameter, 3 cm external diameter and 68 cm height. The operating pressure was atmospheric for all experimental runs. The liquid flow of lightnaphtha was 0.4 Uh, and the catalyst weight was 50 gm, H/
... Show MoreThe Hubble telescope is characterized by the accuracy of the image formed in it, as a result of the fact that the surrounding environment is free of optical pollutants. Such as atmospheric gases and dust, in addition to light pollution emanating from industrial and natural light sources on the earth's surface. The Hubble telescope has a relatively large objective lens that provides appropriate light to enter the telescope to get a good image. Because of the nature of astronomical observation, which requires sufficient light intensity emanating from celestial objects (galaxies, stars, planets, etc.). The Hubble telescope is classified as type of the Cassegrain reflecting telescopes, which gives it the advantage of eliminating chromat
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreInternet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreThe general aim of an experimental design in this paper was to estimate the different treatments effects on the responses by statistical methods. The estimates must be averting biases and the random errors minimized as much as possible. We used multivariate analysis of variance (MANOVA) to analyze design of experiments for several responses. In this paper, we provided three fertilizers (mineral, humic, micro-elements) applied on Yellow Maize experiment. This experiment was conducted by completely randomized design (CRD). We tested four responses (Chlorophyll in paper, total ton / ha, paper area / cm2 and plant height / cm) together to find significant test between them. The partial correlations are between Chlorophyll in paper and total ton
... Show MoreGrammatical particles are so important in understanding a text and its meaning in linguistic context. This paper " Grammatical Behavior and Uses of Negative and Prohibitive Particles in Semitic Languages: A Comparative Semitic Study"
tackles a very important topic in Semitic languages. Comparative studies in Semitic languages shed light on phenomena in different languages that are related or have one common origin. No doubt, such studies have their own effects on language study in general especially when studying a specific phenomenon and explaining it by reliance on the one origin, or by investigating the various phases of its historical development.
... Show MoreThe present study is a hybrid method of studying the effect of plasma on the living tissue by using the image processing technique. This research explains the effect of microwave plasma on the DNA cell using the comet score application, texture analysis image processing and the effect of microwave plasma on the liver using texture analysis image processing. The study was applied on the mice cells. The exposure to the plasma is done by dividing the mice for four groups, each group includes four mice (control group, 20, 50, 90 second exposure to microwave plasma). The exposure to microwave plasma was done with voltage 175v and gas flow on 2 with room temperature; the statistical features are obtained from the comet score images and the textur
... Show MoreNegotiation is considered as one of the most important kinds of communication in the contemporary organizations, which depend on the important role of managerial information systems in providing necessary and suitable information for success of the negotiation process.
Accordingly, this study aims at measuring the extent of the variables effect of managerial information system in the negotiation process.
To achieve this study, two hypotheses were chosen; the first is the correlation relation and the second is the effect, and statistical means represented by correlation coefficient "Spearman" and (R2) were used.
A Number of conclusions were
... Show More