In this paper we introduce two Algorithms, the first Algorithms when it is odd order and how we calculate magic square and rotation for it. The second Algorithms when it be even order and how to find magic square and rotation for it.
Let be a non-trivial simple graph. A dominating set in a graph is a set of vertices such that every vertex not in the set is adjacent to at least one vertex in the set. A subset is a minimum neighborhood dominating set if is a dominating set and if for every holds. The minimum cardinality of the minimum neighborhood dominating set of a graph is called as minimum neighborhood dominating number and it is denoted by . A minimum neighborhood dominating set is a dominating set where the intersection of the neighborhoods of all vertices in the set is as small as possible, (i.e., ). The minimum neighborhood dominating number, denoted by , is the minimum cardinality of a minimum neighborhood dominating set. In other words, it is the
... Show MoreAn experimental study is made here to investigate the discharge coefficient for contracted rectangular Sharp crested weirs. Three Models are used, each with different weir width to flume width ratios (0.333, 0.5, and 0.666). The experimental work is conducted in a standard flume with high-precision head and flow measuring devices. Results are used to find a dimensionless equation for the discharge coefficient variation with geometrical, flow, and fluid properties. These are the ratio of the total head to the weir height, the ratio of the contracted weir width to the flume width, the ratio of the total head to the contracted width, and Reynolds and Weber numbers. Results show that the relationship between the discharge co
... Show MoreIn many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThis study focused on the improvement of the quality of gasoline and enhancing its octane number by the reduction of n-paraffins using zeolite 5A. This study was made using batch and continuous mode. The parameters which affected the n-paraffin removal efficiency for each mode were studied. Temperature (30 and 40 ˚C) and mixing time up to 120 min for different amounts of zeolite ranging (10-60 g) were investigated in a batch mode. A maximum removal efficiency of 64% was obtained using 60 g of zeolite at 30 ˚C after a mixing time 120 min. The effect of feed flow rate (0.3-0.8 l/hr) and bed height (10-20 cm) were also studied in a continuous mode. The equilibrium isotherm study was made using different amounts of zeolite (2-20 g) and the
... Show MorePeriodontitis is a chronic inflammatory disease resulted from aggravated immune response to a dysbiotic subgingival microbiota of a susceptible host. Consequences of periodontitis are not only limited to the devastating effect on the oral cavity but extends to affect general health of the individual and also exerts economic burdens on the health systems worldwide. Despite these serious outcomes of periodontitis; however, they are avoidable by early diagnosis with proper preventive measures or non-invasive interventions at earlier stages of the disease. Clinically, diagnosis of periodontitis could be overlooked due to certain limitations of the conventional diagnostic methods such as periodontal charting and radiographs. Utilization of re
... Show MoreThe Dielectric properties of EP/TiO2 and MgO nanocomposite at
a frequency range of (102-106 Hz) were studied. The composite were
prepared with the state volume ratio (0, 0.05, 0.1) for EP/TiO2 and
MgO respectively. The impedance, dielectric constant and dielectric
loss were found decrease with frequency increase.
The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show More