This paper is concerned with the oscillation of all solutions of the n-th order delay differential equation . The necessary and sufficient conditions for oscillatory solutions are obtained and other conditions for nonoscillatory solution to converge to zero are established.
There are many different methods for analysis of two-way reinforced concrete slabs. The most efficient methods depend on using certain factors given in different codes of reinforced concrete design. The other ways of analysis of two-way slabs are the direct design method and the equivalent frame method. But these methods usually need a long time for analysis of the slabs.
In this paper, a new simple method has been developed to analyze the two-way slabs by using simple empirical formulae, and the results of final analysis of some examples have been compared with other different methods given in different codes of practice.
The comparison proof that this simple proposed method gives good results and it can be used in analy
... Show MoreAutorías: Muhammad Hamza Shihab, Nuha Mohsin Dhahi. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreEfficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pres
... Show MoreElectromechanical actuators are used in a wide variety of aerospace applications such as missiles, aircrafts and spy-fly etc. In this work a linear and nonlinear fin actuator mathematical model has been developed and its response is investigated by developing an algorithm for the system using MATLAB. The algorithm used to the linear model is the state space algorithm while the algorithm used to the nonlinear model is the discrete algorithm. The huge moment constant is varied from (-3000 to 3000) and the damping ratio is varied from (0.4 to 0.8).
The comparison between linear and nonlinear fin actuator response results shows that for linear model, the maximum overshoot is about 10%,
... Show MoreRecalcitrant adventitious root (AR) development is a major hurdle in propagating commercially important woody plants. Although significant progress has been made to identify genes involved in subsequent steps of AR development, the molecular basis of differences in apparent recalcitrance to form AR between easy-to-root and difficult-to-root genotypes remains unknown. To address this, we generated cambium tissue-specific transcriptomic data from stem cuttings of hybrid aspen, T89 (difficult-to-root) and hybrid poplar OP42 (easy-to-root), and used transgenic approaches to verify the role of several transcription factors in the control of adventitious rooting. Increased peroxidase activity was positively correlated with better rooting. We foun
... Show MoreAmong the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS
... Show MoreUreteric obstruction is rarely noted in cases of gastric cancer. Its involvement by distant metastasis from gastric adenocarcinoma without direct invasion is an exceptionally unusual occurrence. This is the story of a 58-year-old man who arrived at the emergency department with acute flank pain and fever. He was initially diagnosed with obstructive pyelonephritis after the discovery of a new onset, complete ureteric obstruction on the left side. Subsequent investigations and follow-up revealed the presence of gastric adenocarcinoma with possible ureteric metastasis bilaterally, flank pain and hydronephrosis were the first and only presentations of gastric cancer. The rarity of the condition and the unusual presentation encouraged us to r
... Show More