In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also found that the use of (SSMC) leads to increase in yield by a factor of 3 of (SWNTs) and produces nanocoil at the same time.
This paper is specifically a detailed review of the Spatial Quantile Autoregressive (SARQR) model that refers to the incorporation of quantile regression models into spatial autoregressive models to facilitate an improved analysis of the characteristics of spatially dependent data. The relevance of SARQR is emphasized in most applications, including but not limited to the fields that might need the study of spatial variation and dependencies. In particular, it looks at literature dated from 1971 and 2024 and shows the extent to which SARQR had already been applied previously in other disciplines such as economics, real estate, environmental science, and epidemiology. Accordingly, evidence indicates SARQR has numerous benefits compar
... Show MoreThis study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Praise be to God, Lord of the worlds, and the best of prayers, and extradition was made to our master Muhammad and his whole family and companions:
And after:
Surat Al-Qariah is from the royal fence, which is in the thirtieth part of the Noble Qur’an. The commentators differed on the number of verses, and the reason for its naming. This surah talked about the conditions of people on the Day of Resurrection, and about how people were removed from their graves, all of which I spoke about in the preamble.
The research is divided into six topics: the first topic dealt with strange terms, while the second topic dealt with the most important audio issues mentioned in the surah, namely (slurring, advertising, substitution, and silenc
Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show MoreBlockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreThis research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome
... Show MoreVarious methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten
... Show MoreThe goal of this research to identify the effect of the probing questions in the collection of material literature with students of the Kurdish language department, to achieve the aim of the research, the researcher has chosen a sample from the students of third stage of the Kurdish language Department, Faculty of Education / Ibn Rushd as a field for the application of experiment.The number of sample reached (71) students divided into two groups represented two divisions of the experimental groups under study to the style of questions sounding by (35) students, and represented the other division of the control group, which studied in the way normal and by (36) students, as rewarded r
... Show More
