In this work, radius of shock wave of plasma plume (R) and speed of plasma (U) have been calculated theoretically using Matlab program.
Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe current study was designated to investigate the effect ofAllium sativumon some physiological and immunological parameters in rats. thirty adult rats were divided into three groups (10 rat for each). G1: served as healthy control, G2 :rats were treated with 150 mg\kg of Allium sativum, G3: treated with 300 mg\kg of Allium sativum. All treated animals were givenorally for 30 days. The aspartate , ) ALT ( alanine transaminase on some parameters were investigated such as garlic effects of total and differential counts of white blood , ) LDH ( lactate dehydrogenase ), AST ( transaminase cells(WBC) like Lymphocyte, Monocyte, Neutrophil, Basophil, Eosinophil,as
... Show MoreThe use of Conservatism significant impacts on the financial statements and thus on financial reporting which is produced by these lists so Rate Some of the professionals that the principle of accounting while Rate of others as a constraint, and brought this category based on the uses of this restriction sometimes used the accountant this restriction and especially with the uncertainties in the Sometimes it may collide with some of the cases in which the accountant may be forced to leave in custody as a result of emergence of economic events that gave rise to rights or future commitments should be disclosed.
The emergence in custody mainly was due to the uncertainty and its essence is to report on a
... Show MoreThe current research studies the aesthetic framework for the dialectical development of the functions of the contemporary theater director in an aesthetic approach to the mechanisms of functional overlap between the dramaturgy and direction functions, and scenography and direction, the detection of the controversial structure of that overlap, and what can be summed up in the following question: (what are the aesthetic approaches of the dialectical development in the function of the contemporary theatre director?). The research is determined by a pivotal aim which is (knowing the aesthetic nature of the dialectical development in
The study aims to identify the reality of the use of educational technology in the teaching of mathematics from the point of view of mathematics teachers in Amman, where the researcher used the descriptive survey method. The sample included (67) female teachers working in public schools in Amman. In order to achieve the objectives of the study, the researcher used the questionnaire as a tool to collect data. The study concluded that many educational techniques are not available from the point of view of the study sample. Mathematics teachers also found that there are many obstacles that prevent the use of educational techniques in schools, most notably the lack of courses offered to teachers on the use of teaching techniques in teaching
... Show MoreThe multimetric Phytoplankton Index of Biological Integrity (P-IBI) was applied throughout Rostov on Don city (Russia) on 8 Locations in Don River from April – October 2019. The P-IBI is composed from seven metrics: Species Richness Index (SRI), Density of Phytoplankton and total biomass of phytoplankton and Relative Abundance (RA) for blue-green Algae, Green Algae, Bacillariophyceae and Euglenaphyceae Algae. The average P-IBI values fell within the range of (45.09-52.4). Therefore, water throughout the entire study area was characterized by the equally "poor" quality. Negative points of anthropogenic impact detected at the stations are: Above the city of Rostov-on-Don (1 km, higher duct Aksai) was 38.57 i
... Show MoreThese days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show More