High frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the international shortwave radio stations and the global beacons as the OIS transmitter and a normal HF receiver as the OIS receiver to verify the direction of propagation and the FOT. In addition, the critical frequency for F2 layer (fof2) was estimated in this paper for Iraq experimentally. The proposed technique was tested practically, and FOT range between Baghdad and other remote stations was estimated successfully using a radio receiver from Kenwood model R 1000 with a long wire antenna as a passive OIS system receiver.
The Contemporary Business Environment is Surrounded by many quick and continues variable and changes which has an effect on the economic units. These variables and changes like the high competition which need many tools to help them to continue and achieve The critical success. So to achieve this they have many competitive strategies like cost leadership strategy, differentiation strategy and focus strategy.
Budget is regarded one of main tools to execute objectives polices and programs of the economic units, beside show how the economic units had execute the available economic resources.
Activity based on budgeting is regarded one of the modern technique in the m
... Show MoreThe article aims to consider the concept of language metaphor in Russian and Arabic languages and the problem of metaphor functioning in language, since it is one of the most important figurative components of the structural organization of the text and an important means of reflecting the national culture of each people. and often in revealing the image of a metaphor one can feel the full flexibility of the language and its beauty.
This study been conducted and applied in Alrashed Health Center/Mahmodia Sector/ kerigh Sector/Ministry of Health/Baghdad City, and conducted on samples of women who are suffering from iron deficiency (Hemoglobin%) in blood for the year 2013. Fifty women been selected (married, unmarried), their ages ranging between 19-40 years old, they been given dried grinding spinach tablet. The dose been given was 3 tablet/day/4-6 weeks, after taken the percentage of Hemoglobin and Uric acid for all studied samples before and after dried spinach tablet given. It was appeared from samples analysis primarily and statically for 50 women, that 4% upon them only suffering high Iron deficiency (8.0-9.9 mg/100ml), 38% upon them suffering from middle iron def
... Show MorePricing has an important position among the elements of marketing mixture (4ps) as it represents revenues that in turn represent one of the important pillars' for resources affecting on organizations sustainability and development , and the failure in determining prices and their strategies has a dangerous effect on the organizations reality and future as a whole . from this point, this is what from the focus of the research problem,which centered on how to get companies to critical price that satisfies customers and achieve corporate objectives.
... Show MoreThe present paper deals with studying the effect of electrical discharge machining (EDM) and shot blast peening parameters on work piece fatigue lives using copper and graphite electrodes. Response surface methodology (RSM) and the design of experiment (DOE) were used to plan and design the experimental work matrices for two EDM groups of experiments using kerosene dielectric alone, while the second was treated by the shot blast peening processes after EDM machining. To verify the experimental results, the analysis of variance (ANOVA) was used to predict the EDM models for high carbon high chromium AISI D2 die steel. The work piece fatigue lives in terms of safety factors after EDM models were developed by FEM using ANSY
... Show MoreIn this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
A significant influence of temperature width found on the vanadium oxide properties, it plays a major role in highlighting the thermal limits of the three phases (metallic, semiconductor, and dielectric). Two values of the temperature width , and , had taken and studied their effect on both the dielectric constant and its two parts; refractive index, and extinction coefficient, and. It found that: as the temperature width is greater, the more the properties of the three phases for . In addition to increasing the thermal range for phases which can be reached to when , while it's at . Our results have achieved great compatibility with the published results globally. In addition to the effect of both ultraviolet, visible, and infrared
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More