Piezoelectric structures are nowadays used in many different applications. A better understanding of the influence of material properties and geometrical design on the performance of these structures helps to develop piezoelectric structures specifically designed for their application. Different equivalent circuits have been introduced in the literature to investigate the behaviour of piezoelectric transducers. The model parameters are usually determined from measurements covering the characteristic frequencies of the piezoelectric transducer. This article introduces an analytical technique for calculating the mechanical and electrical equivalent system parameters and characteristic frequencies based on material properties and geom
... Show MoreIn recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can
Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreIn this study, the preparation and characterization of hyacinth plant /chitosan composite, as a heavy metal removal, were done. Water hyacinth plant (Eichhorniacrasspes) was collected from Tigris river in Baghdad. The root and shoot parts of plant were ground to powder. Composite materials were prepared at different ratios of plant part (from 2.9% to 30.3%, wt /wt) which corresponds to (30-500mg) of hyacinth plant (root and shoot) and chitosan. The results showed that all examined ratios of plant parts have an excellent absorption to copper (Cu (II)). Moreover, it was observed that 2.9% corresponds (30mg) of plant root revealed highest removal (82.7%) of Pb (II), while 20.23% of shoot removed 61% of Cd (II) within 24 hr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.
New thermally stable aromatic poly(amide-imide)s ( PAI1- PAI4 ) were synthesized from direct polycondensation reaction of Terephthalic acid and Phthalic acid with two new different diamine monomers derivatives of 1,2,4,5-tetracarboxilic benzene dianhydride as a second diacides in a medium consisting of triphenyl phosphite (TPP) in N-methyl-2pyrrolidone (NMP) / pyridine solution containing dissolved calcium chloride CaCl2. The polymerization reaction produced a series of novel poly(amide-imide) in high yield. The new monomers were characterized by FTIR, 1H-NMR spectroscopy. The resulting polymers were typically characterized by means of FT-IR, 1H-NMR spectroscopy, and solubility tests. Thermal properties of the poly(amide-imide)s were als
... Show More