A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.
Provisions related to nails in Islamic Fiqh
Nanoparticle has pulled in expanding consideration with the developing enthusiasm for nanotechnology which hold potential as essential segments for development applications. In the present work, a copper nanoparticle is manufactured as a suspension in distilled water by beating a bulk copper target with laser source (532 nm wavelength, 10 ns pulse duration and 10 Hz repletion rate) via method. UV- visible absorption spectra and AFM analysis has been done to observe the effect of repetition rate for the pulsation of laser. Copper nanoparticles (Cu-NPs) were successfully synthesized with green color. The Cu- NPs have very high purity because the preparation was managed in aqueous media to eliminate ambient contaminations. Absorption
... Show MoreThe syntheses, characterizations and structures of three novel dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II), [M(L)2Cl2], complexes (metal = Mn, Co and Ni) are presented. In the solid state the molecules are arranged in infinite hydrogen-bonded 3D supramolecular structures, further stabilized by weak intermolecular π…π interactions. The DFT results for all the different spin states and isomers of dichloro(bis{2-[1-phenyl-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II) complexes, [M(L1)2Cl2], support experimental measurements, namely that (i) d5 [Mn(L1)2Cl2] is high spin with S = 5/2; (ii) d7 [Co(L1)2Cl2] has a spin state of S = 3/2, (iii) d8 [Ni(L1)2Cl2] has a spin state of S =
... Show MoreAbstract
This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project
... Show MoreThis research aims to study the methods of reduction of dimensions that overcome the problem curse of dimensionality when traditional methods fail to provide a good estimation of the parameters So this problem must be dealt with directly . Two methods were used to solve the problem of high dimensional data, The first method is the non-classical method Slice inverse regression ( SIR ) method and the proposed weight standard Sir (WSIR) method and principal components (PCA) which is the general method used in reducing dimensions, (SIR ) and (PCA) is based on the work of linear combinations of a subset of the original explanatory variables, which may suffer from the problem of heterogeneity and the problem of linear
... Show MoreGraphite nanoparticles were successfully synthesized using mixture of H2O2/NH4OH with three steps of oxidation. The process of oxidations were analysis by XRD and optics microscopic images which shows clear change in particle size of graphite after every steps of oxidation. The method depend on treatments the graphite with H2O2 in two steps than complete the last steps by reacting with H2O2/NH4OH with equal quantities. The process did not reduces the several sheets for graphite but dispersion the aggregates of multi-sheets carbon when removed the Van Der Waals forces through the oxidation process.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More