Bulk polycrystalline samples have been prepared by the two-step solid state reaction process. It has been observed that as grown Tl2-xHgxSr2Ca2Cu3O10+δ (with x = 0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.8, 1) corresponds to the 2223 phase. It has been found that Tc varies with Hg content .The optimum Tc is about 120K for the composition Tl1.6Hg0.4Sr2Ca2Cu3O10+δ.The microstructure for Tl1.6Hg0.4Sr2Ca2Cu3O10+δ observed to be most dense and this phase exhibits the highest stability.
In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show MoreThe research aims to achieve market share requirements and reach the targeted competitive price through the application of management accounting techniques represented by continuous improvement technique and target costing under an Activity Based Cost (ABC) system and Activity Based Management (ABM), In Muthanna Cement Company to reach the rationalization of the cost of the product and maintain the required quality and improve the profitability of the company.
The problem of research has emerged in the inability of local firms to enter into effective competition with other companies operating in the same economic sector, Because of the high cost of its products, Which led to the sale of the product at prices below its cost, and t
... Show MoreIn this research a local adsorbent was prepared from waste tires using two-step pyrolysis method. In the carbonization process, nitrogen gas flow rate was 0.2L/min at carbonization temperature of 500ºC for 1h. The char products were then preceded to the activation process at 850°C under carbon dioxide (CO2) activation flow rate of 0.6L/min for 3h. The activation method produced local adsorbent material with a surface area and total pore volume as high as 118.59m2 /g and 0.1467cm3/g, respectively. The produced . local adsorbent (activated carbon) was used for adsorption of lead from aqueous solution. The continuous fixed bed column experiments were conducted. The adsorption capacity performance of prepared activated carbons in this work
... Show MoreTanqua anomala (von Linstow,1904) specimens were recovered, from the lining wall of the gastro-intestinal tract of the dice snake Natrix tessellate tessellate (Laurenti, 1768) collected in Baghdad city, central Iraq. Measurements of the males, females and a comparison of the nematode with other studies tabulated. Reporting of Tanqua anomala from this snake represents the first record for Iraq as well as a new host record.
This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show More