Hydrothermal deposition of CdS on vertically aligned ZnO nanorods for photoelectrochemical solar cell application
...Show More Authors
UML (Unfiled Modeling Language), known as the standard method for object-oriented (analysis and design) modeling, includes other languages which enables it to implement a prototype of the structure and behaviors of the product. This paper attempts to explore the observations about UML role on the cost of software maintenance, and hence on the Total Cost of Ownership (TCO) of a software product. It is therefore important to investigate the benefits obtained through modeling..
Magnetohydrodynamic (MHD) effects of unsteady blood flow on Casson fluid through an artery with overlapping stenosis were investigated. The nonlinear governing equations accompanied by the appropriate boundary conditions were discretized and solved based on a finite difference technique, using the pressure correction method with MAC algorithm. Moreover, blood flow characteristics, such as the velocity profile, pressure drop, wall shear stress, and patterns of streamlines, are presented graphically and inspected thoroughly for understanding the blood flow phenomena in the stenosed artery.
In this work the interaction of plasma jet with water and hydrogen peroxide liquids used for assisted teeth bleaching by plasma jet had been study. A homemade plasma jet system was used. The plasma jet supply by 15 W electrical power generated by high voltage power supply of 9.6 kV peak to peak and frequency of 33 kHz .this power supply generate high electric field on electrodes that would be enough to ionize the argon gas. Some important agents were study such as the effect of the Ar gas flow rates on the length of the plasma jet, the influence of plasma jet on some properties of water and two hydrogen peroxide concentrations 25 % and 30 % like pH, conductivity and liquid temperature for different exposure time. The liquids temperature
... Show MoreHas been studied both processes Almetzaz and extortion of a substance Alklanda Maysan different amounts of Alcaúlan Guy 70% alcohol solution using the method when the wavelength
The purpose of the current article lies in determining the impact of the suggestive exercises on the development of the mental capabilities of children. The researchers used the experimental method with a single-group design, which was appropriate for the core of the current article . The study samble has been specified as children aged 4-6 years in Umm Al-Rabi'een Kindergarten, with a total of 95 children. The study samble (15 children) was randomly selected. . After the exercises were completed, the post-tests have been carried out on the sample with similar circumstances as that of pre-tests. Researchers used statistical methods in the SPSS program. After the results were presented, analyzed, and discussed, The resear
... Show MoreThe problem of research was the lack of research that dealt with issue of the organizational environment, job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of quality of working life and job enrichment on knowledge capital, starting from the hypothesis that there significant impact of quality of working life and job enrichment on knowledge capital, to achieve this goal the researcher from the theoretical literature and related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted quality of working life and job enrichment as independent variable while knowl
... Show MoreIn this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show More