The mixed-spin ferrimagnetic Ising system consists of two-dimensional sublattices A and B with spin values and respectively .By used the mean-field approximation MFA of Ising model to find magnetism( ).In order to determined the best stabile magnetism , Gibbs free energy employ a variational method based on the Bogoliubov inequality .The ground-state (Phase diagram) structure of our system can easily be determined at , we find six phases with different spins values depend on the effect of a single-ion anisotropies .these lead to determined the second , first orders transition ,and the tricritical points as well as the compensation phenomenon .
The purpose of this paper is to examine absorbance for the removal of the Red Congo using wheat husk as a biological pesticide. Several experiments have been conducted with the aim of configuring breakthrough data in a fluidized bed reactor. The minimum fluidized velocities of the bed were found to be 0.031 mm/s for mish sizes of (250) µm diameter with study the mass transfer be calculated KL values. The results showed a well-fitting with the experimental data. Different operating conditions were selected: bed height (2, 5 and 10) cm, flow rate (90, 100and 120) ml/sec and particle diameter (250, 600, 1000) µm. The breakthrough curves were plotted for Congo Red, Values showed that the lower the bed, the lower the number of ad
... Show MoreThis study aimed to recognize the Abilities Musical level and its relation with the for positive thinking, The present study relied on the analytical correlational descriptive approach The study population consisted of 167 female students who participated in musical activities, among the students of Maysaloon Elementary School for Girls affiliated to the Directorate of Education for the Bani Ubaid Brigade in Irbid Governorate. While the sample of this study consisted of (65) female students; , from level: intermediate .
The correlative analytic descriptive method was used, Was applied to the study sample Seachor tests of musical capabilities (the abbreviated image), which was codified by the Arabic (Sadiq (2001), the scale of posi
... Show MoreDetecting the optimum layer for well placement, which requires a diverse assortment of tools and techniques, represents a significant challenge in petroleum studies due to its critical impact on minimizing drilling costs and time. This study aims to evaluate integrated geological, petrophysical, seismic, and geomechanical data to identify the optimum zones for well placement. Three different reservoirs were analyzed to account for lateral and vertical variations in reservoir properties. The integrated data from these reservoirs provides many tools for reservoir development, especially to detect appropriate well placement zones based on evaluations of reservoir and geomechanical quality. The Mechanical Earth Model (MEM) was construct
... Show MoreThis study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.
The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More