This work aims to introduce the concepts of left and right derivations in an AT-algebra and discuss some interesting theorems of these concepts. Also, a fuzzy derivation of an AT-subalgebra, a fuzzy right (left) derivation ideal, a fuzzy derivation of AT-subalgebra, and a fuzzy right (left) derivation ideal are studied. Finally, a level derivation of AT-algebras is defined and some propositions are achieved.
The reduction in the rivers capacity is one the most important issue to give the decision maker an idea during the flood season. The study area included the rivers of the Al Atshan, Al Sabeel and Euphrates, which are surveyed with a length of 21, 5 and 20 km respectively. The Euphrates , the Atshan and Al Sabeel rivers were simulated by using HEC-RAS 5.0.3 software to study the real condition within the city of Assamawa. As well as the simulation was implemented by modifying the cross sections of the Euphrates and Al Sabeel rivers to increase their capacity to 1300 and 1200 m3/s respectively which are a flood discharges100 year return periods. The results showed that the maximum discharge capacity under real conditions o
... Show MoreIt is no secret to every researcher that the choice of a topic for research is not without positive reasons and selected goals, and in this context it seems to me that writing in the subject (testimony of God) is important in many ways; In many places to signify the oneness and sincerity of the Prophet and the prosecution of slaves for their actions in the Hereafter and the control of God Almighty them in the world, which indicates that the subject has to do with the faith and care and orientation towards his study leads to identify the meaning of this testimony and purposes in the context of its receipt and guide to the semantic faces that go to her.
This article investigates the development of the following material properties of concrete with time: compressive strength, tensile strength, modulus of elasticity, and fracture energy. These properties were determined at seven different hydration ages (18 h, 30 h, 48 h, 72 h, 7 days, 14 days, 28 days) for four pure cement concrete mixes totaling 336 specimens tested throughout the study. Experimental data obtained were used to assess the relationship of the above properties with the concrete compressive strength and how these relationships are affected with age. Further, this study investigates prediction models available in literature and recommendations are made for models that are found suitable for application to early age conc
... Show MoreThis study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.
The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreA Wearable Robotic Knee (WRK) is a mobile device designed to assist disabled individuals in moving freely in undefined environments without external support. An advanced controller is required to track the output trajectory of a WRK device in order to resolve uncertainties that are caused by modeling errors and external disturbances. During the performance of a task, disturbances are caused by changes in the external load and dynamic work conditions, such as by holding weights while performing the task. The aim of this study is to address these issues and enhance the performance of the output trajectory tracking goal using an adaptive robust controller based on the Radial Basis Function (RBF) Neural Network (NN) system and Hamilton
... Show More