اليورانيوم المنضب واستخدامه امريكياً في العراق
Abstract
Robotics manipulators with structural flexibility provide an attractive alternative to rigid robotics manipulators for many of the new and evolving applications in robotics. In certain applications their use is unavoidable. The increased complexity in modeling and control of such manipulators is offset by desirable performance enhancements in some respects. In this paperthe single- link flexible robotics manipulator was designed and implemented from Perspex and designed with 0.5 m length , 0.02 m width and with 0.004 m thickness with mass located at the tip. There are four subsystems; motion, control, accelerometer and gyro and a host computer subsystem. The work principle of single-link robotics manipul
... Show MoreThis paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreAzithromycin is the drug of choice in the treatment of several bacterial infections, most often those causing middle ear infection, bronchitis, pneumonia, typhoid and sinusitis. It’s also effective against certain urinary tract infections and venereal diseases. This study was carried out to prepare an acceptable suspension either as dry physical mixture powder or granules to be reconstituted, through studying the effect of various type and concentration of suspending agent (xanthan gum, hydroxypropyl methylcellulose (HPMC), either alone or in combination) on the release profile of the drug. The best prepared suspension formulas (H& III) were selected depending on the dissolution profile of each formulas and then compared with
... Show MoreIn this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.
The aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt
... Show MoreThe study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla
... Show More