The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.
Portland cement concrete is the most commonly used construction material in the world for decades. However, the searches in concrete technology are remaining growing to meet particular properties related to its strength, durability, and sustainability issue. Thus, several types of concrete have been developed to enhance concrete performance. Most of the modern concrete types have to contain supplementary cementitious materials (SCMs) as a partial replacement of cement. These materials are either by-products of waste such as fly ash, slag, rice husk ash, and silica fume or from a geological resource like natural pozzolans and metakaolin (MK). Ideally, the utilization of SCMs will enhance the concrete performance, minimize
... Show MoreAfter completing the research, with the help and success of God Almighty , I will summarize what has been mentioned in a concise and understandable form, without boring prolongation or abbreviation .
The subject, in general, was clarified, clarified and corrected, as I mentioned, for an incorrect concept, about paying zakat on trade goods.
It has known trade offers parts and combination of language and idiomatic .
The rule of zakat on trade goods, and evidence from the Qur'an, Sunnah and consensus .
As well as the conditions of its zakat according to the jurists and their differences in it .
It
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn this paper the definition of fuzzy anti-normed linear spaces and its basic properties are used to prove some properties of a finite dimensional fuzzy anti-normed linear space.
The article emphasizes that 3D stochastic positive linear system with delays is asymptotically stable and depends on the sum of the system matrices and at the same time independent on the values and numbers of the delays. Moreover, the asymptotic stability test of this system with delays can be abridged to the check of its corresponding 2D stochastic positive linear systems without delays. Many theorems were applied to prove that asymptotic stability for 3D stochastic positive linear systems with delays are equivalent to 2D stochastic positive linear systems without delays. The efficiency of the given methods is illustrated on some numerical examples. HIGHLIGHTS Various theorems were applied to prove the asymptoti
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
Linear discriminant analysis and logistic regression are the most widely used in multivariate statistical methods for analysis of data with categorical outcome variables .Both of them are appropriate for the development of linear classification models .linear discriminant analysis has been that the data of explanatory variables must be distributed multivariate normal distribution. While logistic regression no assumptions on the distribution of the explanatory data. Hence ,It is assumed that logistic regression is the more flexible and more robust method in case of violations of these assumptions.
In this paper we have been focus for the comparison between three forms for classification data belongs
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreThe study aims to indicate the role of the mechanisms and principles of corporate governance in the activation of social responsibility reports, and increase disclosure, to achieve sustainability, legitimacy, and integrity of the business. Through the presentation of the conceptual framework for corporate governance and social responsibility, identify the key dimensions of social responsibility and the statement of the relationship between the mechanisms of governance and social responsibility reports in accordance with these dimensions. To prove the hypothesis research has selected a sample of listed companies in the Iraqi market for securities,
... Show MoreResults showed that the optimum conditions for production of inulunase from isolate Kluyveromyces marxianus AY2 by submerged culture could be achieved by using inulin as carbon source at a concentration of 2% with mixture of yeast extract and ammonium sulphate in a ratio of 1:1 in a concentration of 1% at initial pH 5.5 after incubation for 42 hours at 30ºC.