Let M be a n-dimensional manifold. A C1- map f : M M is called transversal if for all m N the graph of fm intersect transversally the diagonal of MM at each point (x,x) such that x is fixed point of fm. We study the minimal set of periods of f(M per (f)), where M has the same homology of the complex projective space and the real projective space. For maps of degree one we study the more general case of (M per (f)) for the class of continuous self-maps, where M has the same homology of the n-dimensional sphere.
Accurate computation of the roughness coefficient is important in the studies of open channel flow. To measure and identify the hydraulic characteristics of the flow system, the model simulation is necessary to study and get the results of the hydraulic properties to specify Manning coefficient of the Euphrates River. In this study, the reach is extended along the Euphrates River from Haditha Dam to Ramadi Barrage with a distance of 169km. The HEC-RAS model was implemented to simulate the flow within the study reach. The geometry of the river was represented by more than two hundred cross-sections surveyed in 2013 and 2021. The model was calibrated using some observed discharges at the Heet gage station for records of th
... Show MoreThe design fabrics of the most important episodes that are at the core process rhetorical communication, until they became these episodes ample room for research and investigation, and the issue of non-familiar formality is nothing but the result of those relationships Constructivism, which is the result of an effort builders coherent activate the shape and attributes of phenotypic, therefore it will cause him a lot of questions about his and founded the organization in order to activate the speech communication between the product(cloth)and the receiver .On this basis, the research problem identified on imposing the question follows:1. Does the non-familiar formal role in enriching communication discourse of women's fabric designs?2. Ar
... Show MoreIn this work, the fractional damped Burger's equation (FDBE) formula = 0,
In this work, the fractional damped Burger's equation (FDBE) formula = 0,
The drying process is considered an effective technique for preserving foods and agricultural products from spoilage. Moreover, the drying process lessens the products' weight, volume, and packaging, which prompts a reduction in the products' transportation costs. The drying technique with solar energy represents an ancient method, still alluring due to solar energy abundance and cost‐effectiveness. In this article, the previous manuscripts concerned with studying and analyzing indirect solar dryer systems that utilize innovative solar air heaters (SAHs) are reviewed. The results and conclusions are discussed intensively to clarify the significance of utilizing this type of drying technique. The ef
Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better