This paper is attempt to study the nonlinear second order delay multi-value problems. We want to say that the properties of such kind of problems are the same as the properties of those with out delay just more technically involved. Our results discuss several known properties, introduce some notations and definitions. We also give an approximate solution to the coined problems using the Galerkin's method.
Most of the theorists and researchers and also those interested in cinema and television attributed the fact of the existence of the dramatic works to the directors may be due to a historical justification. At the same time, the existence of the production world came as a result of the emergence of the production city (Hollywood). This is also a historic fact. The research would tackle all the formative truths to prove the relation and the timeline, i.e., before and after and the synergy that resulted in the existence of the dramatic works that benefited the humanity and those interested in this giving art. The objective of the research is to uncover the formative truth of the dramatic work between direction and production.
The s
... Show MoreGlobal Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufactur
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreJudaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.
The propaganda discourse is the most widely circulated in the media and communication studies, where the interest of scholars and researchers in this field has become clear in the analysis and interpretation of the content of this discourse, to identify the intentions, purposes and objectives of the communicator activity, which exceeded the borders of states in the heated atmosphere of rivalries and political conflicts that characterize The countries of the world as a whole and for many years.
In particular, the economically and militarily developed countries (the Nordic capitalist countries) have exerted special efforts in the production of information and ideas, using advanced methods and means in all details of communication w
... Show MoreThe mechanical function of the heart is governed by the contractile properties of the cells, the mechanical stiffness of the muscle and connective tissue, and pressure and volume loading conditions on the organ. Although ventricular pressures and volumes are available for assessing the global pumping performance of the heart, the distribution of stress and strain that characterize regional ventricular function and change in cell biology must be known. The mechanics of the equatorial region of the left, ventricle was modeled by a thick-walled cylinder. The tangential (circumferential) stress, radial stress and longitudinal stress in the wall of the heart have been calculated. There are also significant torsional shear in the wall during b
... Show MoreThe concept of self is considered one of the important dimensions in the human personality, because feeling of self is an important characteristic in this phase from the psychological point of view.
The first source which forms the concept of self is the physical image, where the built and appearance of the body is considered among the vital matters which determine the person's image of himself/herself.
The current research aims to:
1) Identify the level of physical self concept at the kindergarten children.
2) Identify the level of psychological self concept at the kindergarten children.
3) Iden
... Show MoreObjective(s): The study aims to identify the role of sociodemographic factors in predicting the level of psychological hardiness of nurses.
Methodology: A descriptive correlational study conducted in the Medical City hospitals in the city of Baghdad during the period from November 1, 2022 to May 1, 2023 on a sample of 156 male and female nurses. The validity of the quest
... Show MoreThe current study deals with one of the ancient and modern techniques of ceramic art, which has evolved dramatically. This technique is interested in the muddy Body and its coloring, rather than interesting in the coloring of the layer on the surface of the glass port on the ceramic object. It is classified as ceramic techniques of the single heartburn, where use many coloring oxides. As well as, the use of (Pigment), which is often made of metal compounds, or metal oxides such as iron and manganese, copper and cobalt and more others.
The first chapter includes the problem, the importance, the goal, and the boundaries of the study. In addition, focuses on determining the terms such as (Sgrafitto). The second chapter consists of two to
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More