MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix. In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over of length and 28 have been found.
The main aims of this research is to find the stabilizer groups of a cubic curves over a finite field of order , studying the properties of their groups and then constructing the arcs of degree which are embedding in a cubic curves of even size which are considering as the arcs of degree . Also drawing all these arcs.
The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag
... Show MoreThe current study is descriptive; it focuses on studying the contemporary geopolitical problem, and sectarian differences in Caucasus. Nagorno-Karabakh is considered an important disputed region nowadays. Many parties and states participated in this dispute, especially after the conflict had developed into an open war between Armenia and Azerbaijan. Thus, the study aims to examine the causes of the conflict in this region, analyze the international positions on this conflict, and find if Armenia was able to occupy this region. The methodology adopted by the researchers is the functional approach, and the theory of power analysis that Cohen created for analyzing all strengths that drove each of the parties t
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreThe study aims to indicate the role of strategic financial accounting in the service investors to take appropriate decisions in the future, Through what is provided by the strategic accounting, the future of information and data that enable the investor to make future investment decisions appropriate، If no longer traditional financial accounting putting meet all existing and prospective investors Requirements، That reliance on historical data and information already signed and neglected aspect of future, From this point it was to highlight the role of strategic financial accounting to contribute in this area.
Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show MoreIn the present work, zeolite Y has been synthesized successfully by sol-gel method.Zeolite was synthesized by crystallization of the final gel which consist from seeding and feed stock gels at 85 oC. HY zeolite was prepared by an ion exchange process with ammonium chloride solution and then loaded with different percentages of platinum and titanium by the wet - impregnation method.
X-ray Diffraction (XRD), X-ray Florescence (XRF), Scanning Electron Microscopy (SEM), BET surface area and, Crushing strength were used to characterize the synthesized and prepared catalysts . Results showed high crystallinity 90% with silica to alumina ratio 5 for HY, high surface area of 600 m2/g and pore
... Show MoreTrickle bed reactor was used to study the hydrogenation of nitrobenzene over Ni/SiO2 catalyst. The catalyst was prepared using the Highly Dispersed Catalyst (HDC) technique. Porous silica particles (capped cylinders, 6x5.5 mm) were used as catalyst support. The catalyst was characterized by TPR, BET surface area and pore volume, X-ray diffraction, and Raman Spectra. The trickle bed reactor was packed with catalyst and diluted with fine glass beads in order to decrease the external effects such as mass transfer, heat transfer and wall effect. The catalyst bed dilution was found to double the liquid holdup, which increased the catalyst wetting and hence, the gas-liquid mass transfer rate. The main product of the hydrogenation reaction of n
... Show MoreIn this work, a numerical study is performed to predict the solution of two – dimensional, steady and laminar mixed convection flow over a square cylinder placed symmetrically in a vertical parallel plate. A finite difference method is employed to solve the governing differential equations, continuity, momentum, and energy equation balances. The solution is obtained for stream function, vorticity and temperature as dependent variables by iterative technique known as successive over relaxation. The flow and temperature patterns are obtained for Reynolds number and Grashof number at (Re= -50,50,100,-100) (positive or negative value refers to aidding or opposing buoyancy , +1 assisting flow, -1 opposing flow) and (102 to 105) , respective
... Show More