The effect of air injection angle on the performance of airlift pump used for water pumping has been studied analytically and experimentally. An airlift pump of dimensions 42mm diameter and 2200 mm length with conventional and modified air injection device was considered. A modification on conventional injection device (normal air-jacket type) was carried out by changing injection angle from 90 (for conventional) to 45 and 22.5 (for modified). Continuity and one-dimensional momentum balance for the flow field with basic principle of two-phase flow and expressions of slip ratio and friction factor as function of flow rates were formulated. The analytical and experimental investigations were carried out f
... Show MoreMany of researchers have written about social responsibility and business strategy and competitive advantage, and they have given particular attention to the relationship between economic and social responsibility , but what is missing in this aspect is how the economic units that use their core competencies to advance social responsibility initiatives so that they can achieve a significant competitive advantage and create value for it ?
The current research aims to verify the view that "the economic and social objectives in the long term is not contradictory in nature but complementary objectives essential", as well as make sure that the s
... Show MoreAbstract
This research aims to know the effect of job burnout in the worker’s performance. The researcher presented a theoretical basis for job burnout and the worker's performance. In order to achieve the objectives of the research, a hypothesis was drawn up that determines the nature of the relationship between the independent variable of job burnout and its dimensions (reduced personal accomplishment, depersonalization, Emotional Exhaustion) and variable dependent performance of workers dimensions (productivity, job satisfaction, organizational commitment, creativity), And to represent the volume of this community according to (de Morgan, D. Morgan) glo
... Show MoreThe lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More