In the present paper a low cost mechanical vibration shaker of rotating unbalanced type with uniaxial shaking table was designed and constructed in an attempt to provide opportunities for experimental testing and application of vibration in experimental modal analysis, stress relief of weldments, effect of vibration on heat transfer and seismic testing of civil engineering structures. Also, it provides unexpressive solution to enhance the knowledge and technical skills of students in mechanical vibration laboratory. The shaker consists of a five main parts shaker frame, shaker table, flexible support, drive motor, and eccentricity mechanism. The experimental results show that the amplitude of the shaker is increased with increasing the frequency ratio and the maximum value was attained near the resonance condition. Also, the magnitude of amplitude is increased with increasing the eccentric mass and eccentricity values. A reasonable agreement with theoretical results shows that the shaker can be used with reliable results in vibration testing purposes. Also, in this paper, the frequency ranges of the shaker were determined for constant displacement and for constant acceleration tests to satisfy all the frequency limitation requirements of the mechanical shaker.
This study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Praise be to God, Lord of the worlds, and the best of prayers, and extradition was made to our master Muhammad and his whole family and companions:
And after:
Surat Al-Qariah is from the royal fence, which is in the thirtieth part of the Noble Qur’an. The commentators differed on the number of verses, and the reason for its naming. This surah talked about the conditions of people on the Day of Resurrection, and about how people were removed from their graves, all of which I spoke about in the preamble.
The research is divided into six topics: the first topic dealt with strange terms, while the second topic dealt with the most important audio issues mentioned in the surah, namely (slurring, advertising, substitution, and silenc
Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show MoreA new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome
... Show MoreVarious methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
