Recovery of time-dependent thermal conductivity has been numerically investigated. The problem of identification in one-dimensional heat equation from Cauchy boundary data and mass/energy specification has been considered. The inverse problem recasted as a nonlinear optimization problem. The regularized least-squares functional is minimised through lsqnonlin routine from MATLAB to retrieve the unknown coefficient. We investigate the stability and accuracy for numerical solution for two examples with various noise level and regularization parameter.
Emulsion Liquid Membrane (ELM) is an emerging technology that removes contaminants from water and industrial wastewater. This study investigated the stability and extraction efficiency of ELM for the removal of Chlorpyrifos Pesticide (CP) from wastewater. The stability was studied in terms of emulsion breakage. The proposed ELM included n-hexane as a diluent, span-80 as a surfactant, and hydrochloric acid (HCl) as a stripping agent. Parameters such as mixing speed, aqueous feed solution pH, internal-to-organic membrane volume ratio, and external-to-emulsion volume ratio were investigated. A minimum emulsion breakage of 0.66% coupled with a maximum chlorpyrifos extraction and stripping efficiency were achieved at 96.1% and 95.7% at b
... Show MoreThe water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users. This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer. The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is provided to the user. The design of the water supply network inside the building is
... Show MoreAbstract: The aim of this study is to assess the effectiveness of 940 nm diode laser in comparison to Endoactivator in elimination of smear layer in terms of radicular dentin permeability and ultra-structural changes of root canal walls by SEM evaluation. Twenty-eight single-rooted extracted lower premolars were instrumented up to size X4 (protaper Next, Dentsaply) and divided into two experimental groups according to the irrigation system, G1; activated by EndoActivator and G2; activated by Diode laser 940 nm, CW mode, 1.7 W. Afterward, the roots were made externally impermeable, filled with 2%methylene blue dye, divided horizontally into three segments representing the apical, middle, and coronal thirds then examined under stereo- micr
... Show MoreThis study aimed at identifying the extent to which the social worker used the techniques of group discussion in the professional practice with the groups of school activity in the schools of Tubas governorate in light of some variables (gender, years of experience, academic qualification). The analytical descriptive method was used due to its suitability for the objectives of the study. A questionnaire was designed to collect data that included (30) items, distributed in three areas .The validity and reliability of the tool were verified and then distributed to the study sample.
The results of the study showed that the highest averages were in the discussion stage domain, where the pre-discussion stage was m
... Show MoreIdea of research
The global vision for the future of mankind and societies to achieve supremacy, empowerment and victory is limited to the sincerity of the sincere Islamic vision and its evidence, and this true vision is presented through the texts of the Noble Qur’an, the Sunnah of the Prophet and the concrete reality to achieve victory and empowerment of Islam, and does not respond by tracking the movement of history and its interventions.
The Islamic nation is a nation of survival and continuity with God’s promise and it needs to wake up and alert, and leadership that takes its hand into the path of victory and empowerment, and that this promise fulfills conditions of the most important of these is a promis
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8