This work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic signal becomes wider (2 a.u.) than in the first case. So, this system can be used in many physical applications, such as encrypting confidential information.
Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreDue to the potential cost saving and minimal temperature stratification, the energy storage based on phase-change materials (PCMs) can be a reliable approach for decoupling energy demand from immediate supply availability. However, due to their high heat resistance, these materials necessitate the introduction of enhancing additives, such as expanded surfaces and fins, to enable their deployment in more widespread thermal and energy storage applications. This study reports on how circular fins with staggered distribution and variable orientations can be employed for addressing the low thermal response rates in a PCM (Paraffin RT-35) triple-tube heat exchanger consisting of two heat-transfer fluids flow in opposites directions throug
... Show More
Abstract
This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the e-learning system in addition to the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment, as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in government schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire that contained four different patterns of feedback, which are reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the que
... Show MoreEvaluation was carried out on the existing furrow irrigation system located in an open agricultural field within Hor Rajabh Township, south of Baghdad, Iraq (latitude: 33°09’ N, longitude: 44°24’ E). Two plots were chosen for comparison: treatment plot T1, which used subsurface water retention technology (SWRT) with a furrow irrigation system. While the treatment plot T2 was done by using a furrow irrigation procedure without SWRT. A comparison between the two treatment plots was carried out to study the efficiency of the applied water on crop yield. In terms of agricultural productivity and water use efficiency, plot T1 outperformed plot T2, according to the study’s final fin
An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreInterface evaluation has been the subject of extensive study and research in human-computer interaction (HCI). It is a crucial tool for promoting the idea that user engagement with computers should resemble casual conversations and interactions between individuals, according to specialists in the field. Researchers in the HCI field initially focused on making various computer interfaces more usable, thus improving the user experience. This study's objectives were to evaluate and enhance the user interface of the University of Baghdad's implementation of an online academic management system using the effectiveness, time-based efficiency, and satisfaction rates that comply with the task questionnaire process. We made a variety of interfaces f
... Show MoreThis study aims to show, the strength of steel beam-concrete slab system without using shear connectors (known as a non-composite action), where the effect of the friction force between the concrete slab and the steel beam has been investigated, by using finite element simulation.
The proposed finite element model has been verified based on comparison with an experimental work. Then, the model was adopted to study the system strength with a different steel beam and concrete slab profile. ABAQUS has been adopted in the preparation of all numerical models for this study.
After validation of the numerical models, a parametric study was conducted, with linear and non-linear Regression analysis. An equation re
... Show MoreProject management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreThe goal of the current study was to research the changes in hematological parameters: WBC count, RBCs count, Hb, PCV, neutrophil, lymphocyte, and monocyte in albino mice infected with Aspergillus fumigatus by intraperitoneal injection after induced immunosuppression by intraperitoneal injection of cortisone. The current research also examined an attempt to reduce the infection load by treating Solanum aculeastrum. The result shows higher decreased significance (P≤0. 05) in RBCs, Hb, and PCV after being infected with A. fumigatus 7. 1 ± 0. 8, 11. 3 ± 0. 5 and 41. 5 ± 2. 4, respectively, while the total WBC count, neutrophil, lymphocyte, and monocytes were increased significantly (P≤0. 05) after treatment with S. aculeastrum i
... Show More