The article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each construction especially for large value of and then reduce the running time of the calculation. Therefore, it allows to decrease the memory storage for the calculation processes. This method’s effectiveness evaluation is confirmed by the results of the calculation where a largest size of complete -arc is constructed. This research’s calculation results develop the strategy of the computational approaches to investigate big sizes of arcs in where it put more attention to the study of the number of the inequivalent classes of -secants of -arcs in which is an interesting aspect. Consequently, it can be used to establish a large value of .
This research deals with the most important heritage in Iraq, which are the Iraqi marshes, especially Abu Zarag marsh in Al-Nasiriyah city south of Iraq. The research is divided into two parts. The first part deals with evaluating the water quality parameters of Abu Zarag marsh for the period from December 2018 to April 2019 which is the flooding season. The parameters are Temperature, pH, Electrical Conductivity, Total Dissolved Solids, Alkalinity, Total Hardness, Turbidity, Dissolved Oxygen, Sulfate, Nitrate. The second part is a comparison between the water quality parameters during the recent period with the same period during the previous years from 2014 to 2019. The results are
The effect of heat treatment on the optical properties of the bulk heterojunction blend nickel (II) phthalocyanine tetrasulfonic acid tetrasodium salt and Tris (8-hydroxyquinolinato) Aluminum (NiPcTs/Alq3) thin films which prepared by spin coating was described in this study. The films coated on a glass substrate with speed of 1500 rpm for 1.5 min and treated with different annealing temperature (373, 423 and 473) K. The samples characterized using UV-Vis, X ray diffraction and Fourier transform Infrared (FTIR) spectra, XRD patterns indicated the presence of amorphous and polycrystalline blend (NiPcTs/Alq3). The results of UV visible shows that the band gap increase with increasing the annealing temperature up to 373 K and decreases with
... Show MoreBackground: Several pathologies of the oral cavity have been associated with stress. Dental students need to gain assorted proficiencies as theoretical knowledge, clinical proficiencies, and interpersonal dexterity which is accompanied with high level of stress. Uric acid is the major antioxidant in saliva. The aim of this study is to assess the dental caries experience among dental students with different levels of dental environment stress in relation to physicochemical characteristics of whole unstimulated saliva.
Materials and Methods: the total sample is composed of 300 dental students (73 males, 227 female) aged 22-23 years old, from collage of dentistry / university of Baghdad, from the 4t
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreIn this study, successive electrocoagulation (EC) and electro-oxidation (EO) processes were used to minimize some of the major pollutants in real wastewater, such as organics (detected by chemical oxygen demand (COD)), and turbidity. The wastewater utilized in the present study was collected from the Midland Refinery Company in Baghdad-Iraq. The performance of the successive batch EC-EO processes was studied by utilizing Graphite and Aluminum (Al) as monopolar anode electrodes and stainless steel (st.st.) as the cathode. The Taguchi experimental design approach was used to attain the best experimental conditions for COD reduction as a major response. Starting from chemical oxygen demand COD of (600 ppm), the effects of current density (C
... Show MoreA New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More