The objective of this paper is, first, study a new collection of sets such as field and we discuss the properties of this collection. Second, introduce a new concepts related to the field such as measure on field, outer measure on field and we obtain some important results deals with these concepts. Third, introduce the concept of null-additive on field as a generalization of the concept of measure on field. Furthermore, we establish new concept related to - field noted by weakly null-additive on field as a generalizations of the concepts of measure on and null-additive. Finally, we introduce the restriction of a set function on field and many of its properties and characterizations are given.
New complexes of Cu (ll), Ni (ll), Co (ll), and Zn (ll) wi th 2-amino-5-p-Fiouro Phenyl 1, 3, 4-Thiadiazole have been synthesized. The products were isolated, studied and characterized by physical measurements, ie,(Ff-IR), UV-Vis and the melting points were determined. The new Schiff base (L) has been used to prepare some complexes. The prepared complexes were identified and their structural geometry were suggested
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe research aims at identifying The Effect of Woods model in the Acquisition of Grammatical Concepts on students at the Sixth Primary. The total number of students is (49) male and female. students are distributed in two groups . The First group is the experimental group which is taught the( Woods Model) and it is (25) students . The second group is the control group which is taught according to the traditional method of teaching and it is (24) students . The researcher has matched between the two groups by the following variables : the age (in months), their intelligence, their parents, academic level of education . The research has constructed multiple choice test of (20) items . The reliability of The test has been calculated and it
... Show MoreLiquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of l
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreAn analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.
Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95
... Show MoreDrilling with casing (DWC) can be considered as a modern drilling technique in which both of drilling and casing operations done in the same time by using the casing to transfer the hydraulic and mechanical power to the bit instead of traditional drilling string. To overcome oil well control, minimizing the total cost through enhancing drilling efficiency, drilling with casing was proposed as an enabling technology.
Two surface sections (17 1/2 - and 12 1/4- inch) were drilled successfully in Rumaila oil field with casing strings which reached 655m and 1524m measured depths respectively.
By using DWC technique, the total drill/case phase time was reduced up to 20% comparing to conventional
... Show More