In this study, plastic wastes named (PET and PVC) were used to prepare polymer matrix composite (PMC) which can be used in different applications. Composite materials were prepared by mixing unsaturated polyester resin (UP) with plastic wastes, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with various weight fractions (0, 5,10,15, 20 and 25%) added as a filler in flakes form. In this work, some of the tests that were carried out included (tensile, bending, and compressive strength) as mechanical tests, in addition to (thermal conductivity and water absorption) as physical tests. The values of tensile, compressive strength and Young's modulus of UP increased after
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MorePraise be to Allah , and peace and blessings of God sent mercy to the worlds Muhammad
Amin and his family and his friends and followers to the Day of Judgement .
Savants Jews worked to distort the Torah calamity on the Prophet Moses ( peace be upon
him ) to achieve their goals and objectives , which are decorating sin to their followers , and
spreading corruption on earth, through the charge prophets Bmvassad , morality, as the
example and the example that emulate the human in the book of the Lord of the worlds and
their Prophet Lot, described the weak, and cheese, and lack of modesty, and disobedience ,
drinking alcohol , and his failure to raise his two daughters , Jews are corrupt in the ground .
Koran , which
t
The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in
... Show MoreThe effect of annealing on the structural and optical properties of Antimony trisulfide (Sb2S3) is investigated. Sb2S3 powder is vaporized on clean glass substrates at room temperature under high vacuum pressure to form thin films. The structural research was done with the aid of X-ray diffraction (XRD) and atomic force microscopy (AFM). The amorphous to the polycrystalline transformation of these thin films was shown by X-ray diffraction analysis after thermal annealing. These films' morphology is explained. The absorption coefficient and optical energy gap of the investigated films are calculated using transmission spectra. Both samples have strong absorption in the visible spectrum, according to UV-visible absorption spectra. The optical
... Show MoreAb – initio density function theory (DFT) calculations coupled with Large Unit Cell (LUC) method were carried out to evaluate the electronic structure properties of III-V zinc blend (GaAs). The nano – scale that have dimension (1.56-2.04)nm. The Gaussian 03 computational packages has been employed through out this study to compute the electronic properties include lattice constant, energy gap, valence and conduction band width, total energy, cohesive energy and density of state etc. Results show that the total energy and energy gap are decreasing with increase the size of nano crystal . Results revealed that electronic properties converge to some limit as the size of LUC increase .