Piezoelectric structures are nowadays used in many different applications. A better understanding of the influence of material properties and geometrical design on the performance of these structures helps to develop piezoelectric structures specifically designed for their application. Different equivalent circuits have been introduced in the literature to investigate the behaviour of piezoelectric transducers. The model parameters are usually determined from measurements covering the characteristic frequencies of the piezoelectric transducer. This article introduces an analytical technique for calculating the mechanical and electrical equivalent system parameters and characteristic frequencies based on material properties and geom
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.
Rivers Tigris and Euphrates, as well as the wetlands in southern Iraq and the Diyala River, were all included in the evaluation of earlier studies on the variety and factors impacting fish in Iraqi waters. Different studies documented different types, and the number of species recorded varied between the studies, which could be explained by the registration of some species, synonyms, differs from the registration of some species with synonymous names By mistake, as well as recording new species in times that followed some previous studies, Also, the difference in some factors, including the pollution of some waterways, leads to a difference in the existing species, so we find the presence of species that are tolerant of pollution. There are
... Show Moreالخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في مح
... Show MoreThis research prepared polymer blend contains from epoxy resin (Ep) and polyurethane
)Pu) as a matrix material of percentage (90 %) from epoxy and ) 10 (% polyurethane and
reinforced by PVC fibers and aluminum fibers two dimension knitted mat with fractional
volume(15 %), and study impact strength before and after reinforcing at temperatures of
(20,40,60(
o
CØŒand the results have shown that the reinforcing matrix materials by fibers
increased impact strength values that rise from(3.387kJ/m2) to (151.62kJ/m2) of composite
material (Ep+Pu+PVC(and thus ) Ep+Pu+PVC+Al.F) at last (Ep+Pu+Al.F (. following
composite material so that temperatures increase led to rise impact strength values except the
polymer