Double-layer micro-perforated panels (MPPs) have been studied extensively as sound absorption systems to increase the absorption performance of single-layer MPPs. However, existing proposed models indicate that there is still room for improvement regarding the frequency bands of absorption for the double-layer MPP. This study presents a double-layer MPP formed with two single MPPs with inhomogeneous perforation backed by multiple cavities of varying depths. The theoretical formulation is developed using the electrical equivalent circuit method to calculate the absorption coefficient under a normal incident sound. The simulation results show that the proposed model can produce absorption coefficient with wider absorption bandwidth compared with the conventional double- and even triple-layer MPPs. The bandwidth can be increased to higher frequency by decreasing the cavity depth behind a sub-MPP with small hole diameter and a high perforation ratio, and to lower frequency by increasing the cavity depth behind a sub-MPP with large hole diameter and a small perforation ratio. The experimental data, measured by impedance tube, are in good agreement with the predicted results.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreMarriage is considered one of the strongest ties that links between two human beings , but after the evolutions that happened in our Arab communities and specifically in the Iraqi community , marriage through the internet websites appeared . this kind of marriage is considered one of the new phenomena that appeared in the present time in many societies. That was through internet websites like yahoo , Facebook and other websites that have chat features.
The Islamic sharia looks negatively at marriage through the internet announcing that this way is harmful for both the man and the woman
The current research aims through its chapters to verify the relationship and impact of strategic leadership as an independent variable in the marketing performance as a respondent variable, in a leap cement plant, and try to come up with a set of recommendations that contribute to enhancing the practice and adoption of the two variables in the organization under discussion. And based on the importance of the research topic to the community, and to the researched organization and its members, the analytical and analytical approach was adopted in the completion of this research, and the research community included a leap cement plant in Anbar Governorate, while the research sample was represented by (department heads, and people o
... Show MoreAn anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological
... Show MoreThe current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreEvery cultural achievement is a creative text, and every text is a group of signs. The Winged Bull sculpture is a sort of text that is not confined to some signs; indeed, its cultural signs go far beyond as they are open-ended, everlasting and it lends itself to various horizons of interpretation. The recipient has to combine the signs of this sculpture, which belong to different patterns, in the pursuit for perfection so that he can decode its media message.
I have tackled this sculpture by adopting a semiotic approach. The semiotic approach is a modern critical approach which is as wide as culture and as rich as knowledge. It has been linked to modernism, which in turn has been linked to modern critical approaches, because it can
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More