In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
Targeted research to study variations formalism in the paintings of the scratch -linear , and through surveys carried out by the researcher , found and to his knowledge that the study did not address the researchers before, this researcher found rationale in the study of plates scratch and identify variations of design in it. , Which included the first chapter of the research problem in question the following: What morphological variations in the paintings of the scratch -linear ?In order to reach solutions to this problem and to achieve results so research aims to identify the characteristics of the scratch for paintings , and design fundamentals and relationships , which are identified by the researcher Balentajat completed in all of I
... Show MoreMagneto-rheological (MR) valve is one of the devices generally used to control the speed of Hydraulic actuator of MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. A mathematical model for the MR valve is developed and the simulation is carried out to evaluate the newly developed MR valve. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMMR). The model dimensions of MR valve, material properties are taken into account. The results of analysis are presented in terms of magnetic strength H and magnetic flux density B. The simulation results based on the proposed model indicate that the ef
... Show MoreNAA Mustafa, University of Sulaimani, Ms. c Thesis, 2010 - Cited by 4
Asmari is the main productive reservoir in Abu Ghirab oilfield in the south-east part of Iraq. It has history production extends from 1976 up to now with several close periods. Recently, the reservoir suffers some problems in production, which are abstracted as water production rising with oil production declining in most wells. The water problem type of the field and wells is identified by using Chan's diagnostic plots (water oil ratio (WOR) and derivative water oil ratio (WOR') against time). The analytical results show that water problem is caused by the channeling due to high permeability zones, high water saturation zones, and faults or fracturing. The numerical approach is also used to study the water movement insi
... Show MoreAsmari is the main productive reservoir in Abu Ghirab oilfield in the south-east part of Iraq. It has history production extends from 1976 up to now with several close periods. Recently, the reservoir suffers some problems in production, which are abstracted as water production rising with oil production declining in most wells. The water problem type of the field and wells is identified by using Chan's diagnostic plots (water oil ratio (WOR) and derivative water oil ratio (WOR') against time). The analytical results show that water problem is caused by the channeling due to high permeability zones, high water saturation zones, and faults or fracturing. The numerical approach is also used to study the water movement inside the reser
... Show MoreThis research discusses one of the largest and most important issues of a doctrinal and philosophical dimension at the same time, which is the issue of man’s freedom to choose his actions, and thus his responsibility for those actions, by looking at the nature of these acts, their being and the origin of their creation. He showed that they were created in man by force, and that he was their original creator, and that they were among the creatures of the God Almighty God like others, but they are attributed to man through acquisition. So to the first saying went Jahmiyya or Jabariyya, and to the second saying went to fatalism in the past, and the existentialists shared with them in the modern era, and to the third saying went to the Sun
... Show MoreThe main goal of the current research is to know -Environmental problems included in the content of the two science books (chemistry units) for intermediate stage
A list of environmental problems had been prepared and consisting of (8) main areas which are (air and atmosphere pollution, water pollution, soil pollution, energy, disturbance of biodiversity and environmental balance, waste management, food and medicinal pollution, investment of mineral wealth). Of which (60) sub-problems, at that time the researcher analyzed the two science books (two chemistry units) for the intermediate stage of the academic year (2020-2021) in light of the list that was prepared, and the validity and consisten
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More