Studied competence spam to malicious moth figs at temperatures and Kagafat host different results showed that female intruder, despite their ability to shell larvae host and when densities of different, but it is able to lay eggs at a temperature of 14 + or -1 and finally urged the efficiency spam to malicious affected heavily host and that the greater the intensity of the host spam increased efficiency and its performance life
The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThis work involved the co-substitution of the two bioactive ions of strontium and magnesium into the hydroxyapatite (HA) coating which was then electrochemically deposited on Ti-6Al-4V ELI dental alloy (Gr.23) before and after treatment by Micro Arc Oxidation (MAO). The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of the coating layer was estimated by using pull-off adhesion test. The adhesion strength of Sr/Mg-HA on the Ti-6Al-4V ELI dental alloy after MAO treatment was 1.79 MPa, which was higher than that before MAO treatment (1.62 MPa). The corrosion behavior of th
... Show MoreTransient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of
... Show MoreThe instant global trend towards developing tight reservoir is great; however, development can be very challenging due to stress and geomechanical properties effect in horizontal well placement and hydraulic fracturing design. Many parameters are known to be important to determine the suitable layer for locating horizontal well such as petrophysical and geomechanical properties. In the present study, permeability sensitivity to stress is also considered in the best layer selection for well placement. The permeability sensitivity to the stress of the layers was investigated using measurements of 27 core sample at different confining stress values. 1-D mechanical earth model (MEM) was built and converted to a 3-D full-field geomechanical mode
... Show MoreThis research is an attempt to study aspects of syntactic deviation in AbdulWahhab Al-Bayyati with reference to English. It reviews this phenomenon from an extra-linguistic viewpoint. It adopts a functional approach depending on the stipulates of systemic Functional Grammar as developed by M.A.K. Halliday and others adopting this approach. Within related perspective, fairly’s taxonomy (1975) has been chosen to analyze the types of syntactic deviation because it has been found suitable and relevant to describe this phenomenon. The research hypothesizes that syntactic deviation is pervasive in Arabic poetry, in general and in Abdul-Wahhab Al-Bayyati Poetry in specific, and can be analyzed in the light of systemic Functional Grammar
... Show MoreThe increase in cloud computing services and the large-scale construction of data centers led to excessive power consumption. Datacenters contain a large number of servers where the major power consumption takes place. An efficient virtual machine placement algorithm is substantial to attain energy consumption minimization and improve resource utilization through reducing the number of operating servers. In this paper, an enhanced discrete particle swarm optimization (EDPSO) is proposed. The enhancement of the discrete PSO algorithm is achieved through modifying the velocity update equation to bound the resultant particles and ensuring feasibility. Furthermore, EDPSO is assisted by two heuristic algorithms random first fit (RFF) a
... Show MoreBackground: Obesity is considered an important risk factor for periodontal disease. It has been reported that reactive oxygen species linking both diseases, systemic melatonin supplementation as antioxidant therapy, was addressed as an adjuvant to scaling and root surface debridement (SRP) to enhance the treatment of periodontitis. Objective: To investigate the efficacy of systemic melatonin administration in periodontitis-obese patients as an adjuvant to scaling and root surface debridement (SRP). Methods: A randomized clinical trial was conducted at a dental-specialized center. Eighty subjects were included and allocated into group-I: twenty periodontium-healthy, normal-weight people; group-II: 30 obese patients with stage-III tre
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreThe voice had a special place in the writting of the Andalusian poet (Ibn al-Abar ) , which aroused my attention because of the sonic capacity of the lettering inside the poetic at Ibn al-Abar poems . So Istudied the qualities of the lettering , structures and their exits . Scientists have not been able to determine the musical from the nonmusical sound , but we find the innate ability of Ibn al-Abar , which was able to determine this by using the lettering the right places and to revival the life to reflect the moments of his life , therefore came votes to express his purposes of praise and pride Etc. The poet Ibn al-Abar could exploit the lettering features in the effect of bilateral – static and moving and its ability to e
... Show More