An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreBackground: Atherosclerosis is well known related to age and certain cardiovascular diseases. Aging is one reason of arteries function deterioration which can cause loss of compliance and plaque accumulation, this effect increases by the presence of certain diseases such as hypertension and diabetes disease. Aim: To investigate the reduction of blood supply to the brain in patients with diabetes and hypertension with age and the role of resistive index in the diagnosis of reduced blood flow. Method: Patients with both diseases diabetic and hypertension were classified according to their age to identify the progression of the disease and factors influencing the carotid artery blood flow. By using ultrasound and standard Doppler techniq
... Show MoreThe c.orrosion rate of low carbon steel in 4M hydrochlwic acid with and without presence of thiourea has b.een studied by gravimetric ahd gasometric methods over the temperature range 303-333 K.
The percentage protection of steel increases vvith the decrease of thimuea concentrations at various temperature range 303-333 K and
approaching highest protection (86.82%) at 303K by using I X 1 o-4 M
of thiourea. The high concentration .of thiourea ( lxlo-3 M), enl1ances.
the corrosion rates and act as dcpolariser for the hydrogen evolution
reaction,&n
... Show MoreMetal enhanced fluorescence (MEF) is an unequaled phenomenon of metal nanoparticle surface plasmons, when light interacts with the metal nanostructures (silver nanoparticles) which result electromagnetic fields to promote the sensitivity of fluorescence. This work endeavor to study the influence of silver nanoparticles on fluorescence intensity of Fluoreseina dye by employment mixture solution with different mixing ratio. Silver nanoparticles had been manufactured by the chemical reduction method so that Ag NP layer coating had been done by hot rotation liquid method. The optical properties of the prepared samples (mixture solution of Fluoreseina dye solutions and colloidal solution with 5 minutes prepared of Ag NPs) tested by using UV-V
... Show MoreThe accelerating effect of 1,4- phenylenediamine (PDA) additions in 1M hydrochloric acid solution at temperature rang (20-60) C° has been studied by weight losses measurement during ranging time (1-260) h and by following the pb2+ concentration in solution after several times by using Atomic absorption spectroscopy (AAS) . The volume of hydrogen gas involving was followed also in presence and absence of (PDA) in the corrosive solution .Accelerating enhanced by adding (NaCl , NaBr , NaI ) was also investigated.
mixtures of cyclohexane + n-decane and cyclohexane + 1-pentanol have been measured at 298.15, 308.15, 318.15, and 328.15 K over the whole mole fraction range. From these results, excess molar volumes, VE , have been calculated and fitted to the Flory equations. The VE values are negative and positive over the whole mole fraction range and at all temperatures. The excess refractive indices nE and excess viscosities ?E have been calculated from experimental refractive indices and viscosity measurements at different temperature and fitted to the mixing rules equations and Heric – Coursey equation respectively to predict theoretical refractive indices, we found good agreement between them for binary mixtures in this study. The variation of th
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn this study, a mathematical model is presented to study the chemisorption of two interacting atoms on solid surface in the presence of laser field. Our mathematical model is based on the occupation numbers formula that depends on the laser field which we derived according to Anderson model for single atom adsorbed on solid surface. Occupation numbers formula and chemisorption energy formula are derived for two interacting atoms (as a diatomic molecule) as they approach to the surface taking into account the correlation effects on each atom and between atoms. This model is characterized by obvious dependence of all relations on the system variables and the laser field characteristics which gives precise description for the molecule –
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More