MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix. In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over of length and 28 have been found.
In the Name of God, the Most Gracious, the Most Merciful
Praise be to God, who taught the pen anthropology unless he knows, and peace and blessings be upon the master of bullying, and the imam of the eloquent Prophet Muhammad, the sincere and faithful, and his family and companions as a whole and whoever followed him to the Day of Judgment. And after:
The science of grammar is among the most important of all language sciences at all, if not the most important of its sciences, due to the multiplicity of its doctrines and schools, the diversity of its methods, its phenomena and subjects, as well as the connection of this science with the most honorable languages,
The Arab economy suffers from many structural imbalances problems which are getting complicated by the appearance of the world economic variables.
This change held risky challenges for the Arab economies in the light of unsuitable regional and international conditions. Since that it has been very essential for the Arab experts, especially those related to economy and politics, to face those new challenges or, at least, adapt with them believing that they can have both positive and negative impacts on the Arab economy.
This study has acquired its importance in the light of the critical levels the Arab economy reached out of the world economic variables, resulting in long-term
... Show MoreMuch has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
The defferenation of the contract, as alegal concept, is one of the new ideas in scientific research, aim to charectrise each condition or obligation of the contract, as an independent contract of the other parts, conclude under the agreement of the parties on a specific object with its own cause; this idea had applied in international contract too, specifically with the choice of law applicable to the international contract, that’s also supported by the potentiality of chossing the applicable law after concluding the international contract.
The choice of the applicable law, play a significant role in implementing the function of the international contract as a gear to org
... Show MoreThe products of composites material are very sesetive to many variables, such as manufacturing process, additive materials, …. etc. Filler or additive plays a major role to determine the formation of the properties and behavior of the composites. In this study, polyethylene terephthalate-based compounds were produced and characterized. The work is concerned to prepare samples of Polyethylene terephthalate (PET) - zinc-ferrite (ZnFe2O4) with different addition ratio as zinc-ferrite (1, 2, 5, 10, 15 and 20) wt% obtained from mixing the solution with a hot pressing method applied under optimum conditions. The densities of the composites for all samples were calculated. Through the work the diffusion of zinc-ferrite i
... Show MoreThe research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.
This research has included some of the theoretical concepts to each of the Equity
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show Moreاضاءات على الانتخابات الشريعية في العراق عام 2010
Consider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs derived from the group and a few classes of zero-divisor graphs of the commutative ring R are examined.