The dispersion relation of linear quantum ion acoustic waves is derivate according to a fluid approach that depends on the kinetic description of the systems of charged particles model. We discussed the dispersion relation by changing its parameters and graphically represented. We found through graphs that there is full agreement with previous studies on the subject of interest. That motivates us to discuss the dispersion relation of waves depending on the original basic parameters that implicitly involved in the relationship which change the relationship by one way or another, such as electron Fermi temperature and the density at equilibrium state.
In the process of translating Qur’anic texts, there is an urgent need for interpretations of the Qur’anic text due to the presence of many incomprehensible Qur’anic verses or words because of our distance from the standard Arabic, language in which the Holy Qur’an was revealed, and the introduction of the foreign words into our language, in addition to the fact that many Qur’anic words are no longer used. All this prompted the need for the interpretation of the Qur'anic text, Therefore, it is necessary for the translator to resort to the books of interpretation if he intends to translate the Qur’an
Identity crisis is a dominant literary theme, especially in most Arab women writers’ works. However, it has not been given enough attention from a linguistic point of view. By so doing, the current study intends to fill this gap by analyzing the identity crisis from a pragma-stylistic perspective by examining the writer's style in three purposely selected extracts from Diana Abu-Jaber’s novel Origin (2007). The study aims to examine the identity crisis by using pragmatic and stylistic tools and to explore the effects of Abu-Jaber’s stylistic choices on the readers of her work. To conduct this study, an eclectic model comprising Searle’s speech acts (1979), Brown and Levinson's politeness theory (1987), Leech's model of figur
... Show MoreThis research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreThis book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
We report a method of converting non-conductive plastic surfaces into conductive by plating either copper electroless or copper electroplating -carbon black containing bending Agent onto Perspex plastics . Various approaches have been studied in order to comparing properties of the plated copper for two methods such as scanning electron microscopy (SEM),thickness, roughness, porosity, tensile Strength and elongation. The results show that the surface of electroplating was uniform, compact, and continuous and it had an obvious metallic sheen, while the surface of plated copper for electroless for it had many pores. Also observed that the coating was composed of small cells. Thes
... Show MoreCo-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.