The article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each construction especially for large value of and then reduce the running time of the calculation. Therefore, it allows to decrease the memory storage for the calculation processes. This method’s effectiveness evaluation is confirmed by the results of the calculation where a largest size of complete -arc is constructed. This research’s calculation results develop the strategy of the computational approaches to investigate big sizes of arcs in where it put more attention to the study of the number of the inequivalent classes of -secants of -arcs in which is an interesting aspect. Consequently, it can be used to establish a large value of .
Objectives : This study was seeks to determine the IgG and IgM in serum mothers and their babies of Iraqi patient suffering from congenital anomalies toward some microorganisms such as Cytomegalovirus (CMV), Congenital toxoplasmosis , Congenital rubella and Genital herpes simplex virus (HSV) correlated with age and babies gender the sample was collected from AL- Alwayia hospital for children / Baghdad . Methodology : Fifth blood sample have been collected from mothers and their babies suffering from congenital anomalies to detection IgG and IgM of some viruses including as Cytomegalovirus (CMV), congenital tox
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
On Saturday, May 13, 2023, a glorious day was engraved in the history of Al-Kindy College Medical Journal as it is the day of indexing the journal in the Scopus Database Journals. The journal has paced a strenuous journey to make that achievement.
Abstract
This study was to demonstrate the role-use planning scientific methods is disabled and little used in the planning and follow-up construction of vital projects in the province of Baghdad, including network planning methods, in order to find the optimal time to finish the project in light of the resources available and the budget set for it, in the current research has been used the most prominent network planning methods and two stylistic (CPM / PERT), was the application of the critical path method on standard-design school project (traditional) to draw Action Network according to confirmed times for the activities of the project and account his Crashing time , It was Pert technique applied to the project hemato
... Show Moreobjective the research to diagnosis and interpretation of the nature of the correlation between the basic elements of knowledge management (tecgnology , structure , culture , process , human resource ) and the strategic performance of the Iraqi private banks, the research community and the level dimensions, and tested this research in the private banking sector represented by (7), especially in Baghdad city, Iraqi banks, and applied on sample consisting of 100 distributors in several administrative levels Director (Director, Director of the department, branch manager), and use questionnaire Head to collect data and information tool, and some private banks annual reports, has sought research to test a number of h
... Show MoreSuspicion in the truth that the satisfaction of the student in the criticism of the speech of the poet and the writer to I bin Al-Atheer
Specialized banks provide their banking activities to their customers at interest rates that are determined according to the approved bank policy, which is almost similar to most or most banks. To satisfy the financial desires of customers and at the same time it is a source of the bank's profits, However, these banks have been introduced to new services that they provide with the funds of the Central Bank initiative launched at the beginning of (2016) to address the economic stagnation that befell the country due to the (financial security) crisis that the country faced in 2014. To put forward initiatives amounting to nearly (15) trillion dinars, which were put forward through private commercial and Islamic banks and specialized
... Show MoreThis research deals with the most important indicators used to measure the phenomenon of financial depth, beyond the traditional indicators, which are called quantitative indicators, which is shown to be inadequate to show the facts accurately, but it may come in the results of a counterfactual, although reliable in econometric studies done in this regard.
Therefore, this research has sought to put forward alternative indicators, is the structural indicators, and financial prices, and availability of financial instruments, and cost of transactions concluded, in order to measure the phenomenon of financial depth.
After using and analyzing data collected from countries the research
... Show More