In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.
An experiment was carried out on the fields of the college of Agriculture - Abu Ghraib, of a silty clay loam soil that has moisture of 15-16%, to study the effect of plowing and pulverization systems on some plant indicators of onion. The experiment included plowing systems with three levels (plowing with a moldboard plow, plowing by chisel plow and zero tillage plowing) as a primary factor. The second factor was that pulverization for only one time and repeating the pulverization twice through the use of the rotary tiller. The plant indicators of onion that are studied: plant length, onion diameter, onion weight and onion neck diameter. The experiment has carried out according to SPLIT PLOT design according to RCBD design by three replicat
... Show MoreConsiderable amounts of domestic and industrial wastewater that should be treated before reuse are discharged into the environment annually. Electrocoagulation is an electrochemical technology in which electrical current is conducted through electrodes, it is mainly used to remove several types of wastewater pollutants, such as dyes, toxic materials, oil content, chemical oxygen demand, and salinity, individually or in combination with other processes. Electrocoagulation technology used in hybrid systems along with other technologies for wastewater treatment are reviewed in this work, and the articles reviewed herein were published from 2018 to 2021. Electrocoagulation is widely employed in integrated systems with other electrochemical tech
... Show MoreBack ground: This in vitro study was carried out to investigate the effect of post space regions (coronal, middle and apical), Time and the mode of polymerization (dual, self-cured) of the cements used on the bond strength between translucent fiber post and root dentin by using push-out test. Materials and Methods: Forty eight extracted mandibular first premolars (single root) were instrumented with ProTaper Universal system files (for hand use) and obturated with gutta percha for ProTaper and AH26® root canal sealer following the manufacturer instructions, after 24 hours post space was prepared using FRC postec® plus drills no.3 creating 8 mm depth post space. The prepared samples were randomly divided into two main groups (24 samples ea
... Show MoreThe operative system of theatrical performance depends on the construction of the scenographic space, as it constitutes the most aesthetic effect of the recipient, and the body of the theatrical discourse that contains the signs of the show, and it comes as an embodiment of the directing vision of the show director, so most of the world directors resorted to attention to the output treatment to establish the scenographic space, and thus it possesses a contrast in The embodiment of the directing vision according to the stylistic and hermeneutical dimension of the director, so the two researchers found the importance of studying the topic, and the study came under the title (Directing Treatments of the Scenographic Space in the Iraqi Theat
... Show MoreThe variation in wing morphological features was investigated using geometric morphometric technique of the Sand Fly from two Iraqi provinces Babylon and Diyala . We distributed eleven landmarks on the wings of Sand Fly species. By using the centroid size and shape together, all species were clearly distinguished. It is clear from these results that the wing analysis is an essential method for future geometric morphometry studies to distinguish the species of Sand Flies in Iraq.
Virtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope. The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir
... Show MoreAleksandr Isayevich Solzhenitsyn was born in 1918 in Kislovodsk. His father was educated, and despite his peasantry origin, he got a university degree. Unfortunately, however, Solzhenitsyn could not recognize his father, for he died before his birth.
Solzhenitsyn was accused of being an opponent to the Soviet Union due to his activities of that time. He was exiled to a forced labour camp for eight years, on the surroundings of Moscow. He spent three years in Kazakhstan, and was sent to the life exile. He was set free in 1956. He worked as a teacher in in rural schools in Vladimir and then in Rezhran.
His greatest works were in the reign of Kherchov, and in 1962 appeared his story under the title of "One day in
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More