Shot boundary detection based on orthogonal polynomial
...Show More Authors
Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of
... Show MoreThe aim of this study is to investigate the sedimentation environments and diagenetic processes of the Ibrahim Formation (Oligocene-early Miocene) in Zurbatiya, eastern Iraq. The Ibrahim Formation is comprised mostly of clayey micrite and skeletal grains composed of planktonic foraminifera, calcispheres, radiolaria, and benthic foraminifera. Glauconite and pyrite were documented in some restricted zones of this formation; they reflect quiet and reducing conditions. Radiolaria were identified in Late-Oligocene which was not known previously at this age regionally in carbonate formations of the Arabian Plate (AP). Mudstone, wackestone, and planktonic foraminiferal wackepackstone are the main microfacies that are affected by dissolutio
... Show MoreFree vibration behavior was developed under the ratio of critical buckling temperature of laminated composite thin plates with the general elastic boundary condition. The equations of motion were found based on classical laminated plate theory (CLPT) while the solution functions consists of trigonometric function and a continuous function that is added to guarantee the sufficient smoother of the so-named remaining displacement function at the boundaries, in this research, a modified Fourier series were used, a generalized procedure solution was developed using Ritz method combined with the imaginary spring technique. The influences of many design parameters such as angles of layers, aspect ratio, thickness ratio, and ratio of initial in-
... Show MoreThe advertisement is important in maximizing the resources of journalistic institutions. It helps them to perform their duties and also establishes their independence. However, this type of communication has often overlapped with other types of communication, including media and publicity.
Those in charge of the press bear responsibility in this regard, as some of them harness the advertisement for personal purposes; or detrimental to media content. Many communication authorities have drawn attention to the danger of confusing the concepts and levels of the three activities and have moved towards establishing rules to reduce overlap between them.
The aim of this research is to try to disengage the concept of advertising,
... Show MoreNumerical Investigation was done for steady state laminar mixed convection and thermally and hydrodynamic fully developed flow through horizontal rectangular duct including circular core with two cases of time periodic boundary condition, first case on the rectangular wall while keeping core wall constant and other on both the rectangular duct and core walls. The used governing equations are continuity momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C.) methods. The Finite Difference approach with the Line Successive Over Relaxation (LSOR) method is used to obtain all the computational results the (B.F.C.) method is used to generate th
... Show MoreTransient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure sinusoidal amplitude range and
... Show MoreIn this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More