توزيعات كثافة البروتون (PDD)، خلافاتهم وتناثر الإلكترون مرنة عوامل الشكل، F (ف) من ارض الدولة لبعض نوى قذيفة، مثل ( 104 المشتريات، 106
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreIn the present work, a program for calculating the coefficients of the Aplanatic Cassegrain Telescope (ACT) system, free from the effects of spherical and coma aberrations, were constructed. In addition, the two-mirrors of the optical system, as aspherical surfaces, were adopted. This means, that the two-equations of the mirrors are assumed to be polynomial function of five even terms only. The numerical method, least-squares curve fitting method to calculate the two-mirror coefficients system, was adopted. For choosing the values and ratios that give the best results, Rayleigh Criterion (Rayleigh Limit), for purpose of comparison and preference, was adopted.
The current study is considered a field study to measure the level of satisfaction of the academic programs of Media Masters students. That was accomplished through surveying the attitudes of the students who are enrolled in the faculties of media at the following universities: (Petra University, The Middle East University (MEU), and Al-Yarmouk University). Those students were enrolled in the master’s program within the formal educational system during the second semester of the academic year (2015 – 2016). This survey aims to identify the services, facilities and academic programs provided by the concerned faculties. It, also, aims to identify the public relations, administrative, educational and services aspects of those faculties.
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show MoreCharge transfer (CT) at liquid/liquid interfaces are described theoretically depending on the quantum theory .A model that derived used to calculate the rate constant of transport at liquid/liquid interfaces. The calculation of the rate constant of charge transfer depends on the calculation of the reorganization energy, driving force ,and the coupling coefficient . Large reorganization energies and large rate constant for charge transfer ,indicate that the transitions involve more energy to happen . The system have large ð¸0 (ð‘’ð‘‰) refers that type of liquid is more reactive media than other liquid types with same d
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
In this paper, the solar surface magnetic flux transport has been simulated by solving the diffusion–advection equation utilizing numerical explicit and implicit methods in 2Dsurface. The simulation was used to study the effect of bipolar tilted angle on the solar flux distribution with time. The results show that the tilted angle controls the magnetic distribution location on the sun’s surface, especially if we know that the sun’s surface velocity distribution is a dependent location. Therefore, the tilted angle parameter has distribution influence.