A (k,n)-arc A in a finite projective plane PG(2,q) over Galois field GF(q), q=p⿠for same prime number p and some integer n≥2, is a set of k points, no n+1 of which are collinear. A (k,n)-arc is complete if it is not contained in a(k+1,n)-arc. In this paper, the maximum complete (k,n)-arcs, n=2,3 in PG(2,4) can be constructed from the equation of the conic.
Abstract: Choosing suitable artificial teeth for partially edentulous patients and arranging these teeth in a way to look natural is difficult. An important factor in dentures construction is the mesiodistal width of anterior teeth, because a denture would not appearance natural if artificial teeth are of incorrect size. While for a successful orthodontic treatment, mesiodeistal width of teeth is important for space analysis and for establishing proper occlusion. The aim of this study is to determine the correlation between the average mesiodistal width of anterior and posterior teeth in male and female Iraqi population. 40 Iraqi subjects with normal occlusion participated in this study. Mesiodistal measurement of all teeth was carried out
... Show MoreData mining is a data analysis process using software to find certain patterns or rules in a large amount of data, which is expected to provide knowledge to support decisions. However, missing value in data mining often leads to a loss of information. The purpose of this study is to improve the performance of data classification with missing values, precisely and accurately. The test method is carried out using the Car Evaluation dataset from the UCI Machine Learning Repository. RStudio and RapidMiner tools were used for testing the algorithm. This study will result in a data analysis of the tested parameters to measure the performance of the algorithm. Using test variations: performance at C5.0, C4.5, and k-NN at 0% missi
... Show MoreThe partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of are derived from the relation between and level density parameter . The formulae used to derive are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on from the Thomas-Fermi formula show a good agreement with the experimental data.
In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe aim of this paper is to analyzed unsteady heat transfer for magnetohydrodynamic (MHD) flow of a second grade fluid in a channel with porous medium. The equations which was used to describe the flow are the momentum and energy, these equations were written to get thier non dimentional form. Homotopy analysis method (HAM) is employed to obtain a semi-analytical solutions for velocity and heat transfer fields. The effect of each dimensionless parameter upon the velocity and temperature distributions is analyzed and shown graphically by using MATHEMATICA package.
The problem of the study and its significance:
Due to the increasing pressures of life continually, and constant quest behind materialism necessary and frustrations that confront us daily in general, the greater the emergence of a number of cases of disease organic roots psychological causing them because of severity of a lack of response to conventional treatments (drugs), and this is creating in patients a number of emotional disorders resulting from concern the risk of disease
That is interested psychologists and doctors searchin
... Show MoreThe purpose of the research is to identify the social capital of the Municipality of Samawah Municipality by defining the level of its three dimensions (the structural dimension, the relational dimension and the cognitive dimension) and identifying the appropriate means that contribute to increasing the structural empowerment of the workers in the Municipality of Samawah. Between the social capital and the structural empowerment of the workers. From the perspective of social capital, the researchers examined the correlation and the effect of dimensions (structural, relational, cognitive) on the structural empowerment of the workers and with data collected from a sample of (168) Samawah, which is part of the Ministry of Constructi
... Show More