In this present paper, an experimental study of some plasma characteristics in dielectric barrier discharge (DBD) system using several variables, such as different frequencies and using two different electrodes metals(aluminium (Al) and copper (Cu)), is represented. The discharge plasma was produced by an AC power supply source of 6 and 7 kHz frequencies for the nitrogen gas spectrum and for two different electrodes metals(Al and Cu). Optical emission spectrometer was used to study plasma properties (such as electron temperature ( ), electron number density ( ), Debye length ( ), and plasma frequency ( )). In addition, images were analysed for the plasma emission intensity at atmospheric air pressure.
Abstract:
Al-Hamraa palace considers one of the most important urban traces
that the Arab left behind in Andalus .Muhammed bin Al—Ahmer put its fist
stones then it was finished later by his thrown hirer .The poems of (ibn-
Zumrek)were graved on the palaces doors ,halls, and lion cages with all the
proud and dignity those poems contain.
This search identifies this palace first, then studies the contents of the
poems on Walls ,then the Urban features, and description of the palace sites
,buildings materials ,pillars ,decorations, and the geometrical
Vocabularies in the poems such as spaces , direction ,distance ,and
height.
Then the search describes the technical engineering of words
coordination, the
Tax information system is one of the most important means that help the tax administration to reach the real income of the taxpayer, and the problem of research came in the General Authority for Tax ,The next question (Does the control carried out by the Central Bank on foreign remittances to reach the real income of the taxpayer). The research is gaining importance by focusing on the Central Bank's control over foreign remittances, and how to use this control to finance the tax information system. The relationship between the Central Bank's control over foreign remittances and the tax information system.The study has reached a number of recommendations, the most important of which are the following: The work of an integrated information
... Show MoreThe current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote
... Show MoreIn this paper, a national grid-connected photovoltaic (PV) system is proposed. It extracts the maximum power point (MPP) using three-incremental-steps perturb and observe (TISP&O) maximum power point tracking (MPPT) method. It improves the classic P&O by using three incremental duty ratio (ΔD) instead of a single one in the conventional P and O MPPT method. Therefore, the system's performance is improved to a higher speed and less power fluctuation around the MPP. The Boost converter controls the MPPT and then is connected to a three-phase voltage source inverter (VSI). This type of inverter needs a high and constant input voltage. A second-order low pass (LC) filter is connected to the output of VSI to reduce t
... Show MoreThis paper proposes a self organizing fuzzy controller as an enhancement level of the fuzzy controller. The adjustment mechanism provides explicit adaptation to tune and update the position of the output membership functions of the fuzzy controller. Simulation results show that this controller is capable of controlling a non-linear time varying system so that the performance of the system improves so as to reach the desired state in a less number of samples.
In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreDue to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.