This paper is attempt to study the nonlinear second order delay multi-value problems. We want to say that the properties of such kind of problems are the same as the properties of those with out delay just more technically involved. Our results discuss several known properties, introduce some notations and definitions. We also give an approximate solution to the coined problems using the Galerkin's method.
In "historical" fiction, characters that never really existed, give expression to the impact of historical events on the people who really did live through them. The result is not history, as an accurate record of actual events, but fiction in which an earlier age is rendered through the personal joys and sufferings of characters. This paper
aims at investigating the historical realities presented in Dickens’s A Tale of Two Cities.
The assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und
... Show MoreThe permeability is the most important parameter that indicates how efficient the reservoir fluids flow through the rock pores to the wellbore. Well-log evaluation and core measurements techniques are typically used to estimate it. In this paper, the permeability has been predicted by using classical and Flow zone indicator methods. A comparison between the two methods shows the superiority of the FZI method correlations, these correlations can be used to estimate permeability in un-cored wells with a good approximation.
Background: This in vitro study evaluated the effect of canal dryness and flaring on the accuracy of two electronic apex locators for working length (WL) determination. Materials and methods: Sixty extracted teeth were used, after access opening was done, the occlusal surface was flattened to create stable reference point. The teeth were randomly divided into two equal main groups of flared and unflared group each one of 30 teeth. The flaring was done with Gates Glidden drills. The two main groups were further subdivided into two subgroups: dry canal and wet canal using 5.25% sodium hypochlorite groups, Electronic WL of each sample was determined using both Root ZX and i-Root apex locator. Consequently, histologic WL was determined by shav
... Show MoreMost studies on deep beams have been made with reinforced concrete deep beams, only a few studies investigate the response of prestressed deep beams, while, to the best of our knowledge, there is not a study that investigates the response of full scale (T-section) prestressed deep beams with large web openings. An experimental and numerical study was conducted in order to investigate the shear strength of ordinary reinforced and partially prestressed full scale (T-section) deep beams that contain large web openings in order to investigate the prestressing existence effects on the deep beam responses and to better understand the effects of prestressing locations and opening depth to beam depth ratio on the deep beam performance and b
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreIn this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.
the rationalization of energy consumption Require awareness in the possibility of bridging the local need severe shortage of electric power for daily requirements. The research aims to show that the engineers of various specializations and architects, including in particular can have an active role in about the importance of the role of energy in human life, and it’s best utilization without extravagance (which our religion forbids it). Here lies the problem of the research to find possible means and alternative methods to reduce (rationalization) electrical energy consumption in hot dry areas in general which need large energy for air conditioning because of the crucial climate of these regions that making access to the area o
... Show More