This paper is concerned with combining two different transforms to present a new joint transform FHET and its inverse transform IFHET. Also, the most important property of FHET was concluded and proved, which is called the finite Hankel – Elzaki transforms of the Bessel differential operator property, this property was discussed for two different boundary conditions, Dirichlet and Robin. Where the importance of this property is shown by solving axisymmetric partial differential equations and transitioning to an algebraic equation directly. Also, the joint Finite Hankel-Elzaki transform method was applied in solving a mathematical-physical problem, which is the Hotdog Problem. A steady state which does not depend on time was discussed for each obtained general solution, i.e. in the boiling and cooling states. To clarify the idea of temperature rise and fall over the time domain given in the problem, some figures were drawn manually using Microsoft PowerPoint. The obtained results confirm that the proposed transform technique is efficient, accurate, and fast in solving axisymmetric partial differential equations.
Al-Wasiti's drawings are the first attempt to document the Arab landscape more than 778 years ago. These drawings were associated with a fine literary material, and the relationships between words and poetic sentences are matched by artistic, aesthetic and color relations in drawing, as they are all outputs of a sense that agreed in creativity and differed in the language of expression. Al-Wasiti was creative in drawing these events. Islamic painting has a goal that differs from the goals of the painting arts that preceded it or its contemporary, as it tends to “beautification” only. This is achieved by true copying from nature, just as it is achieved by drawing what is transmitted from nature, transforming and refining it. The
... Show MoreBridging the Gap between Graphemes and Phonemes in the Phonetic Transcription
The current study deals with one of the ancient and modern techniques of ceramic art, which has evolved dramatically. This technique is interested in the muddy Body and its coloring, rather than interesting in the coloring of the layer on the surface of the glass port on the ceramic object. It is classified as ceramic techniques of the single heartburn, where use many coloring oxides. As well as, the use of (Pigment), which is often made of metal compounds, or metal oxides such as iron and manganese, copper and cobalt and more others.
The first chapter includes the problem, the importance, the goal, and the boundaries of the study. In addition, focuses on determining the terms such as (Sgrafitto). The second chapter consists of two to
This research study focuses on fundamental questions. It deals with the content of the critical reviews through which the most important sources that undermine the renaissance of the Islamic human society can be concluded. It is the vague fetishization of the sacred between religion, politics, and ideas, which members of society live in and which raised the dust of closed-minded fanaticism that led to the return of deviant extremism. It is oppression, violence, and domination, all of which are professional tools in the manufacture of the ideology of extremism in all its forms. Here, the idea matured in giving a human, intellectual and philosophical overview that mixed the required drawing in the formulation of scientific cont
... Show MoreRisk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreJurisprudential rules, a broad section to lower the legitimacy of the ruling on the developments of politics, which is increasing day by day, and developments of complex judicial issues, provided that the rule derived from the texts of the legitimate or verbal significance.
And the introduction of jurisprudence rules in the provisions concerning the legitimate policy, the first to take from the provisions of the situation; because the rules of jurisprudence is a summary of the provisions reached by the scholars of the nation after study and scrutiny, which is qualified and largely to cover the need of the owners of public mandates.