Requirement-Driven Generation of Distributed Ledger Architectures
...Show More Authors
Corpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language. In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedago
... Show MorePhotocatalytic materials are being investigated as effective bactericides due to their superior ability to inactivate a broad range of dangerous microbes. In this study, the following two types of bacteria were employed for bactericidal purposes: Gram-negative Escherichia coli (E. coli) and Gram-positive Staphylococcus aureus (S. aureus). The shape, crystal structure, element percentage, and optical properties of Ag9(SiO4)2NO3 were examined after it was successfully synthesized by a standard mixing and grinding processing route. Bactericidal efficiency was recorded at 100% by the following two types of light sources: solar and simulated light, with initial photocatalyst concentration of 2 µg/mL, and 97% and 95% of bactericidal acti
... Show MoreThe traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show MoreReinforced concrete (RC) beams containing a longitudinal cavity have become an innovative development and advantage for economic purposes of light-weight members without largely affecting their resistance against the applied loads. This type of openings can also be used for maintenance purposes and usage space of communication lines, pipelines, etc. RC beams are primarily loaded in the plane of the members, which are two-dimensional in a plane stress state and the dominant structural behaviours include bending, shear, or combination of both. In the present study, six numerical models of RC beams with and without openings were simulated by using commercial finite element software ANSYS to evaluate the structural behaviours of those b
... Show MoreBased on the results of standard penetration tests (SPTs) conducted in Al-Basrah governorate, this research aims to present thematic maps and equations for estimating the bearing capacity of driven piles having several lengths. The work includes drilling 135 boreholes to a depth of 10 m below the existing ground level and three standard penetration tests (SPT) at depths of 1.5, 6, and 9.5 m were conducted in each borehole. MATLAB software and corrected SPT values were used to determine the bearing capacity of driven piles in Al-Basrah. Several-order interpolation polynomials are suggested to estimate the bearing capacity of driven piles, but the first-order polynomial is considered the most straightforward. Furthermore, the root means squar
... Show More