Free Radical Copolymerization of Styrene/ Methyl Methacrylate were prepared chemically under Nitrogen ,which was investigated, in the present of Benzoyl Peroxide as Initiator at concentration of 2 × 10-3 molar at 70 °C, which was carried out in Benzene as solvent to a certain low conversion . FT-IR spectra were used for determining of the monomer reactivity ratios ,which was obtained by employing the conventional linearization method of Fineman-Ross (F-R) and Kelen-Tüdos (K- T). The experimental results showed the average value for the Styrene r1 / Methyl Methacrylate r2 system, Sty r1 = 0.45 , MMA r2 = 0.38 in the (F–R) Method and r1 = 0.49 , r2 = 0.35 in the (K–T) Method, The Results of this indicated show the random distribution of monomers in the copolymer.Likewise The monomer reactivity ratios were evaluated Mathematically in comparison in the (F–R) Method with the data STY r1 = 0.61 , MMA r2 = 0.47 , and r1 = 0.45 , r2 =0.38 in the (K–T) Method. And were used the values r1 ,r2 for STY / MMA Copolymers in computing integral curves for the instantaneous Copolymer composition throughout the whole range of conversion.
The research aims to identify the relationship between employing future skills during teaching from the viewpoint of students of Islamic studies at the Northern Border University, as well as their attitudes towards future professions. The researcher employed the correlational descriptive approach. The tools were a questionnaire for employing future skills, and a scale for the attitude towards the future profession. The two research tools were applied to a random sample of (242) male and female students from the department of Islamic Studies, College of Education and Arts. The findings showed that the total level of employing future skills and their three axes during teaching was average. It was also found that the attitude towards future
... Show MoreThis study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show MoreThe current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me