For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
The research aimed to identify the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information. Such goal includes a set of sub-goals: Knowing the reasons for media offices' reliance on the information provided by the Cabinet's website; and revealing the benefit derived from relying on the Cabinet's website.
The researcher used the survey method to screen and comprehend the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information.
The mechanism of comprehensive account of the limits of research wa
... Show MoreThree types of zeolite A were prepared from Iraqi kaoline which are 3A, 4A and 5A by ion exchange method .They were characterized by XRD and atomic absorption techniques .They were used as adsorbents to examine their applicability for H2S adsorption .The adsorption process was performed in a static form and constant volume system which constructed from stainless steel .The effect of zeolite type and temperature on the adsorption properties of H2S at -5 , 25 and 55 oC was studied .The zeolite type 5A has the highest adsorption value (79.384 µmol/g ) and the three types may be arranged in a sequence toward H2S adsorption as 5 A> 4A>3A .The amount of H2S adsorbed increased as temperature decreased from 55 to -5 for all samples. Langmuir , Fre
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreAbstract: This research was performed to study the effect of some amino acids and vitamins on the growth of bacteria Staphylococcus aureas and its sensitivity against UV light. The results showed low inhibition in bacterial growth because amino acids repairs the damges caused by UV light. Besides the effect of two groups of antibiotics (β-lactame and tetracycline) on the growth of S. aureus and the possible interference of amino acids and vitamins in the activity of the antibiotics against this bacteria in the presence of UV light were studied. The result show increase in the sensitivity towards these antibiotics and provided protection against the antibiotics.
Wrestling Judo, one of the sports that have seen greatdevelopment in recent years in the world, requiring preparationphysically special, which is to be determined physical aptitude of thebad functional efficiency of the heart and lungs, Efficient physicalclosely linked to the ability of the player performance, as the physicalaptitude to play an important role the possibility of control over theaspects and physical skills during training and competition.The study aims to determine the effect of training on anaerobicendurance according to the average (30-60 sec) in the development ofphysical aptitude for judo players. Used a much more extremeexperimental method on a sample was Blaabat national teamwrestling judo and numbers of 16 for the play
... Show MoreBackground: This study was formulated to compare the effect of 5%hydrofluoric acid in comparison to 37%phosphoric acid with and without the application of silane on bond strength of composite to porcelain. Materials and Methods: Specimen preparation was divided in to two phases, metal-disks fabrication (8mm-diameter and 4mm-thickness) and ceramic veneering. Thirty two specimens were prepared, sandblasted with 50 μm aluminum oxide, and divided into four groups of eight samples. Groups I and III were etched with 37%phosphoric acid while groups II and IV were etched with 5%hydrofluoric acid; and groups I and II were silaneted while groups III and IV were not. Heliobond, and resin composite were applied to each specimen using a plastic transpa
... Show More