In the present work, the focusing was on the study of the x-ray diffraction, dielectric constant, loses dielectric coefficient, tangent angle, alter- natively conductivity and morphology of PET/BaTio3. The PET/BaTio3 composite was prepared for polyethylene terephthalate PET polymer composite containing 0, 10, 20, 30, 40, 50, and 60 wt. % from Barium titanate BaTi03 powder. The composite of two materials leads to form mixing solution and hot-pressing method. The effect of BaTio3 on the structure and dielectric properties with morphology was studied on PET matrix polymer using XRD, LCR meter and SEM.
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis paper is an attempt to demonstrate the syntactic behavior of -ly adverbs and -ly adjectives. It mainly deals with -ly as an inflectional suffix that forms adverbs and adjectives It is hypothesized that there are differences between adjective-forming –ly and adverb-forming –ly.The researcher first made general and specific observations about the morphological processes of -ly adverbs and -ly adjectives. Since the study focuses on a linguistic phenomenon, its data is a set of -ly adverbs and -ly adjectives used as examples to support the hypothesis. The importance of studying the syntactic behavior of -ly stems from the fact that thousands of English adjectives and adverbs are created by adding the suffix "-ly" to their roots
... Show MoreThis research for university students dialectic unemployment and work, focusing on
serious discussion, accurate and provide opinions between specialists and those interested in
the university youth issues and identify them in the light of the dialectical relationship
between unemployment and work for the purpose interpreted accurate and access to reality
without coverage and linked to the movement of the changing society now and the situation
that is happening in Iraq, where the loss of the safety and the weakness of the determinants of
economic well-being and the decline of public and social health and the unemployment rate
security in the heart of - programs - and blocs parties that Tgtill public opinion in any
Eat this research study features Technical Ceramics Islamic and Chinese The study of four chapters , such as the first chapter the general framework for research and containing the problem that put the following question: Mamdy effect features art on porcelain Islamic and Chinese ) , and whether there are dimensions of the aesthetic , intellectual and ideological in porcelain Islamic and Chinese with lies the importance of research in the promise of a qualitative study and add a scientific theme features art in porcelain Islamic and China , and the objectives of this study One was in the detection of features technical Ceramics Islamic and Chinese study examined the length of time the ninth century AD , and the tenth century AD , and in
... Show More