Bulk polycrystalline samples have been prepared by the two-step solid state reaction process. It has been observed that as grown Tl2-xHgxSr2Ca2Cu3O10+δ (with x = 0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.8, 1) corresponds to the 2223 phase. It has been found that Tc varies with Hg content .The optimum Tc is about 120K for the composition Tl1.6Hg0.4Sr2Ca2Cu3O10+δ.The microstructure for Tl1.6Hg0.4Sr2Ca2Cu3O10+δ observed to be most dense and this phase exhibits the highest stability.
A cost-effective and efficient detector was created to conduct thorough turbidimetric measurements by reaction of Co (II) ion with calcium ferro cyanide to form bright green particulate, using the method of continuous flow injection analysis, the use of NAG-5SX1-1D-SSP Analyzer in determining cobalt (II) ion in a test for the validity of the new design. The NAG-5SX1-1D-SSP Analyzer is composed of five irradiation sources of white snow leds having the diameter of 10 mm with one solar cell of 55 mm length, 13.5 mm width. Using a selector switch to select the optimum voltage to be used which was 2.7 VDC. Under conditions of optimization, cobalt (II) ion was determined at 0.005–20 mmol. L–1(n = 23) while linearity dynamic range 0.005–7 mm
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show MoreBackground: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u
... Show MoreThe energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThe goal of the research is to develop a sustainable rating system for roadway projects in Iraq for all of the life cycle stages of the projects which are (planning, design, construction and operation and maintenance). This paper investigates the criteria and its weightings of the suggested roadway rating system depending on sustainable planning activities. The methodology started in suggesting a group of sustainable criteria for planning stage and then suggesting weights from (1-5) points for each one of it. After that data were collected by using a closed questionnaire directed to the roadway experts group in order to verify the criteria weightings based on the relative importance of the roadway related impacts
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
Free water surface constructed wetlands (FSCWs) can be used to complement conventional waste water treatment but removal efficiencies are often limited by a high ratio of water volume to biofilm surface area (i.e. high water depth). Floating treatment wetlands (FTWs) consist of floating matrices which can enhance the surface area available for the development of fixed microbial biofilms and provide a platform for plant growth (which can remove pollutants by uptake). In this study the potential of FTWs for ammoniacal nitrogen (AN) removal was evaluated using experimental mesocosms operated under steady-state flow conditions with ten different treatments (two water depths, two levels of FTW mat coverage, two different plant densities and
... Show More