The purpose of this work is to study the classification and construction of (k,3)-arcs in the projective plane PG(2,7). We found that there are two (5,3)-arcs, four (6,3)-arcs, six (7,3)arcs, six (8,3)-arcs, seven (9,3)-arcs, six (10,3)-arcs and six (11,3)-arcs. All of these arcs are incomplete. The number of distinct (12,3)-arcs are six, two of them are complete. There are four distinct (13,3)-arcs, two of them are complete and one (14,3)-arc which is incomplete. There exists one complete (15,3)-arc.
Despite recent attempts to improve safety in the construction sector, this sector is considered dangerous and unsafe. Iraq is one of the emerging nations that suffers from a lack of construction safety management. In 2018, the construction sector in Iraq was responsible for 38% of all industrial accidents. Creating a safety program minimizes this problem by making safety an intrinsic part of construction projects. As a result, this article aims to identify the crucial safety factors that affect the safety performance in Iraqi construction projects. After conducting a critical literature review of the related literature, a list of 35 sub-factors classified into nine categories of main factors was chosen to rank each facto
... Show MoreOne of the most important problems of Iraqi construction projects is the cost variances, so it is important to identify the problems and shortcomings that cause poor cost control. Through the utilization of questionnaires, the study evaluated how project costs were managed and reported. The questionnaire was distributed to 180 professionals working in the Iraqi construction sector, with a response rate of 91%. The results showed that a high percentage of projects are implemented with a difference between real and estimated costs, and the process of documenting cost data needs to be more secure. On the other hand, there is a weakness in providing the necessary work structure information to monitor costs and a lack of proc
... Show MoreA series of lanthanide metal (???) complexes have been prepared from the new azo ligand, 3-(1-methyl-2-benzimidazolylazo)-Tyrosine (MBT). The structural feature were confirmed on the basis of their elemental analysis, metal content, molar conductance, magnetic measurement, FTIR, 1 HNMR and UV-Vis spectra studies. The isolated complexes were found to have a mole ratio (1:2) (metal:ligand) stoichiometry with the general formula [Ln(MBT)2]Cl (Ln(???) = La, Ce, Pr, Nd, Sm, Eu and Gd). The chelates were found to have octahedral structures. The FTIR spectra shows that the ligand (MBT) is coordinated to lanthanide ions as a N, N, O-tridentate anion via benzimidazole nitrogen, azo nitrogen and oxygen of hydroxyl after deprotonation. Com
... Show MoreNew Schiff bases derivatives [IV]a-e is prepared via condensation of Derythroascorbic acid with p-substituted aldehydes in dry benzene. To obtain these derivatives, the 5,6-O-isopropylidene-L-ascorbic acid[I] was chosen as starting material, compound prepared from the reaction of L-ascorbic acid as starting material. Compound[I] was prepared from the reaction of L-ascorbic acid with dry acetone in the presence of hydrogen chloride. The esterification of hydroxyl groups at C-2 and C-3 positions with excess ofethyl α –chloroacetate in the presence of sodium acetate produce acorresebonding ester [II] , which was condensed with hydrazine hydrate to give new hydrazide [III] . The new Schiff bases [IV]a-e were synthesized by reaction of acid h
... Show Moreحضر الليكاند (L) 1-فنيل-3-بردين-2-يل مثيل-ثايويوريا من تفاعل 2-أمينو مثيل بردين مع فنيل ايزوثايوسيانيت وبنسبة 1: 1 وشخص الليكاند بواسطة التحليل الدقيق للعناصر (C, H, N), الأشعة تحت الحمراء، الأشعة فوق البنفسجية–المرئية وطيف الرنين النووي المغناطيسي كما حضرت وشخصت معقدات أملاح بعض ايونات العناصر الثنائية التكافؤ (Co, Ni, Cu, Cd and Hg). استخدمت تقنية الأشعة تحت الحمراء، الأشعه فوق البنفسجية-المرئية, التوصيلية الكهربائية و الا
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More