A cap of size and degree in a projective space, (briefly; (k,r)-cap) is a set of points with the property that each line in the space meet it in at most points. The aim of this research is to extend the size and degree of complete caps and incomplete caps, (k, r)-caps of degree r<12 in the finite projective space of dimension three over the finite field of order eleven, which already exist and founded by the action of subgroups of the general linear group over the finite field of order eleven and degree four, to (k+i,r+1) -complete caps. These caps have been classified by giving the t_i-distribution and -distribution. The Gap programming has been used to execute the designed algorit
... Show MoreIf the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i
... Show MoreThis research aims to numerous risks to the portfolio of the insurance company that arise from practicing the activity in general, and the risks arising from insurance contracts in particular, and what is the role of the company in the disclosure to help users (such as owners) to understand and concentration of risks in the financial reporting and identifying movable risks size to reinsurers that may affect the solvency of the portfolio and makes them at a given moment required to fulfill the obligations towards policyholders outweigh the financial capacity, which leads to stumble or bankruptcy.
So I sought this research is to identify the extent of the obligation to disclose the accounting for this risk and the extent of their i
... Show MoreThe condition of Islam and Muslims and what their political, social, cultural and educational status, and even religious and faith status, has led to whoever feels his belonging to this great religion and that middle nation, to try as much as he can to fix what has been corrupted as much as he can, and perhaps in diagnosing illness and illness as It was said half the way to treatment, and from this standpoint I liked to occupy thought, work consideration and harness part of the youth’s life in order to reach what contributes to reforming the situation and the safety of generations, and this is only in seeking knowledge and learning it by following the guidance of the Messenger (r) and his companions ( y) Therefore, the subject of my re
... Show MoreIn this investigation, the mechanical properties and microstructure of Metal Matrix Composites (MMCs) of Al.6061 alloy reinforced by ceramic materials SiC and Al2O3 with different additive percentages 2.5, 5, 7.5, and 10 wt.% for the particle size of 53 µm are studied. Metal matrix composites were prepared by stir casting using vortex technique and then treated thermally by solution heat treatment at 530 0C for 1 hr. and followed by aging at 175 0C with different periods. Mechanical tests were done for the samples before and after heat treatment, such as impact test, hardness test, and tensile test. Also, the microstructure of the metal matrix composites was examine
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The remediation oil production by matrix acidizing method on the well named "X" (for confidential reasons) is scrutinized in this paper. Initial production of 1150 bpd, production index of 2.8 STB/Psi/d and permeability of 150md, in 2018 two years down the lane this dropped to 450 bpd, production index 0.7 STB/Psi/d. The declined observed on the production index is trouble shouted and after elimination of (no completion damage/perforation damage), the skin is calculated by carrying out a well test (build-up test) whose extrapolation in excel over times gave us a skin of 40.The reservoir heterogeneity, containing >20% of feldspar, carbonates and paraffin’s guided thematrix acidizing design and treatment proposition to remedy thi
... Show MoreAcute appendicitis is the most common surgical abdominal emergency. Its clinical diagnosis remains a challenge to surgeons, so different imaging options were introduced to improve diagnostic accuracy. Among these imaging modality choices, diagnostic medical sonography (DMS) is a simple, easily available, and cost effective clinical tool. The purpose of this study was to assess the accuracy of DMS, in the diagnosis of acute appendicitis compared to the histopathology report, as a gold standard. Between May 2015 and May 2016, 215 patients with suspected appendicitis were examined with DMS. The DMS findings were recorded as positive and negative for acute appendicitis and compared with the histopathological results, as a gold standard
... Show More