A particular solution of the two and three dimensional unsteady state thermal or mass diffusion equation is obtained by introducing a combination of variables of the form,
η = (x+y) / √ct , and η = (x+y+z) / √ct, for two and three dimensional equations
respectively. And the corresponding solutions are,
θ (t,x,y) = θ0 erfc (x+y)/√8ct and θ( t,x,y,z) =θ0 erfc (x+y+z/√12ct)
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn architectural learning, it is difficult to stimulate cultural awareness through the traditional education approaches, which results in historic places being neglected as knowledge sources. This research explores the premise that sketch-based visual storytelling may act as a generative approach to connect cognition, emotion, and behavior in historical contexts. The study adopts a qualitative methodology to explore a learning experience comprising two phases: the first is a formal educational setting, and the second is a historical and cultural context, aiming to investigate the role of sketch-based storytelling in enhancing cultural awareness. MAXQDA was employed to code the students’ storyboards on three levels of cultural awareness, m
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe mechanism for selecting the President of the Republic and his constitutional powers under the Constitution of the Republic of Iraq
Thin films of CdTe were prepared with thickness (500, 1000) nm on the glass substrate by vacuum evaporation technique at room temperature then treated different annealing temperatures (373,473,and 573)K for one hour. Results of the Hall Effect and the electrical conductivity of (I-V) characteristics were measured in darkness and light.at different annealing temperature results show that the thin films have ability to manufacture solar cells, and found that the efficient equal to (2.18%) for structure solar cell (Algrid / CdS / CdTe /glass/ Al) and the efficient equal to (1.12%) for structure solar cell (Algrid / CdS / CdTe /Si/ Al) with thick ness of (1000) nm with CdTe thin films at RT.
The author’s research is dedicated to the actual problem of identifying the linguoculturological and translation features of the glutonic vocabulary both in Russian and in Arabic. It is noted that the vocabulary of the glutonic type is extremely rich and diverse, as it is part of the national and linguistic culture of the Russian and Arab people. In the gastronomic discourse of the Russian people and the Arab peoples, it is represented by various parts of speech. The study of the traditions of food consumption confirmed the rich stylistic possibilities of the glutonic vocabulary, the names of bread in Russian and Arabic languages. It has been established that in modern Russian gastronomic discourse, glutonic lexical units are involved
... Show More