The major goal of this research was to use the Euler method to determine the best starting value for eccentricity. Various heights were chosen for satellites that were affected by atmospheric drag. It was explained how to turn the position and velocity components into orbital elements. Also, Euler integration method was explained. The results indicated that the drag is deviated the satellite trajectory from a keplerian orbit. As a result, the Keplerian orbital elements alter throughout time. Additionally, the current analysis showed that Euler method could only be used for low Earth orbits between (100 and 500) km and very small eccentricity (e = 0.001).
A new, simple, sensitive and fast developed method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation a burgundy color complex between methyldopa andammonium ceric (IV) nitrate in aqueous medium using long distance chasing photometer NAG-ADF-300-2. The linear range for calibration graph was 0.05-8.3 mmol/L for cell A and 0.1-8.5 mmol/L for cell B, and LOD 952.8000 ng /200 µL for cell A and 3.3348 µg /200 µL for cell B respectively with correlation coefficient (r) 0.9994 for cell A and 0.9991 for cell B, RSD % was lower than 1 % for n=8. The results were compared with classical method UV-Spectrophotometric at λ max=280 n
... Show MorePricing has an important position among the elements of marketing mixture (4ps) as it represents revenues that in turn represent one of the important pillars' for resources affecting on organizations sustainability and development , and the failure in determining prices and their strategies has a dangerous effect on the organizations reality and future as a whole . from this point, this is what from the focus of the research problem,which centered on how to get companies to critical price that satisfies customers and achieve corporate objectives.
... Show MoreThis research on women under the title (Empowerment of women… From value education to the creation of human morality), includes a disclosure of the reasons that prevented women from performing their human role in the development of human societies and treatments that can provide to solve this big problem in the life These communities, especially the Eastern societies and the religious ones, believe that the woman has not received the care and care to raise her human values in order to contribute to the required social contribution, for historical, economic, moral, religious, social and cultural reasons. And by shedding light on specific definitions of the most important rules on which the research relied
... Show MoreA prepared PMMA/Anthracene film of thickness 70μm was irradiated under reduced pressure ~10-3 to 60Coγ-ray dose of (0.1mrad-10krad) range. The optical properties of the irradiated films were evaluated spectrophotometrically. The absorption spectrum showed induced absorption changes in the 200-400nm range. At 359nm, where there is a decrease in radiation-induced absorption, the optical density as a function of absorbed dose is linear from 10mrad-10Krad.It can therefore, be used as radiation dosimeter for gamma ray in the range 10mrd-10krad
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
This research involves studying the mechanical properties and corrosion behavior of “low carbon steel” (0.077wt% C) before and after welding using Arc, MIG and TIG welding. The mechanical properties include testing of microhardness, tensile strength, the results indicate that microhardness of TIG, MIG welding is more than arc welding, while tensile strength in arc welding more than TIG and MIG.
The corrosion behavior of low carbon weldments was performed by potentiostat at scan rate 3mV.sec-1 in 3.5% NaCl to show the polarization resistance and calculate the corrosion rate from data of linear polarization by “Tafel extrapolation method”. The results indicate that the TIG welding increase the corrosion current d
... Show MoreThis research describes the design & implementation of frequency synthesizer using single loop Phase lock loop with the following specifications: Frequency range (1.5 – 2.75) GHz,Step size (1 MHz), Switching time 36.4 µs, & phase noise @10 kHz = -92dBc & spurious -100 dBc
The development in I.C. technology provide the simplicity in the design of frequency synthesizer because it implements the phase frequency detector(PFD) , prescalar & reference divider in single chip. Therefore our system consists of a single chip contains (low phase noise PFD, charge pump, prescalar & reference divider), voltage controlled oscillator , loop filter & reference oscillator. The single chip
... Show More