The aim of this paper is to construct cyclic subgroups of the projective general linear group over from the companion matrix, and then form caps of various degrees in . Geometric properties of these caps as secant distributions and index distributions are given and determined if they are complete. Also, partitioned of into disjoint lines is discussed.
CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
This study was conducted in a lath house, Dept of Hort. and Landscape, College of Agricultural Engineering Sciences, Univ. During the 2021 growing season, Baghdad will investigate the influence of organic and Biological fertilizers on three Citrus rootstocks' growth and leaf mineral content. The first factor is the addition of liquid organic fertilizers Vit-Org (O) at three levels without addition (O0), soil addition at 10 ml.L-1 (O10) and soil addition at 20 ml.L-1 (O20). The second factor is the addition of nitrogen-fixing bacteria without addition (N1), add 30 ml.Transplant-1 of Azotobacter chroococcum (N2) and add 30 ml.Transplant-1 of Azospirillum brasilemse (N3). The third factor is three citrus rootstocks: sour orange (R1), R
... Show MoreThe primary objective of this research be to develop a novel thought of fibrewise micro—topological spaces over B. We present the notions from fibrewise micro closed, fibrewise micro open, fibrewise locally micro sliceable, and fibrewise locally micro-section able micro topological spaces over B. Moreover, we define these concepts and back them up with proof and some micro topological characteristics connected to these ideas, including studies and fibrewise locally micro sliceable and fibrewise locally micro-section able micro topological spaces, making it ideal for applications where high-performance processing is needed. This paper will explore the features and benefits of fibrewise locally micro-sliceable and fibrewise locally
... Show Moreالامم المتحدة وقضايا التنمية في العالم الثالث
The Current research aims to identify ( The effects of Daniel Model in Cognitive Motivation for the Students of the Third grade average ) , To verify the objective of this research , the researchers added nul hypothesis following : There is no difference is statistically significant at the level of ( 0.05 ) between the average scores of students who studied Daniel Model and the average students who studied by using traditional method in Cognitive Motivation scale. The research was conducted on a sample of the average Third grade students in a medium Al – sadiq Al – Ameen secretary for boys affiliated to the General Directorate for Educational in Baghdad Al – rusafa 2 and for academic year ( 2014 – 2015 ) , the researchers adopted
... Show MoreThe present study aimed to identify teaching problems which facing the teachers for first three grades classes, and if these problems different according to some variables teacher qualification, experience period, class grade). The study sample consist of (137 )
female teachers who teach the first three grades in Braimy city in Oman, teachers spread in five government schools. Both researchers developed questionnaire to measure problems faced by the mentioned teachers, consist of 50 questions distributed into 4 dimensions (teacher, students, the curriculum, the evaluations), Also researchers checked questionnaire validity and stability. The results indicate to: The most common probl
... Show MoreIn the present work, a z-scan technique was used to study the nonlinear optical properties, represented by the nonlinear refractive index and nonlinear absorption coefficients of nanoparticles cadmium sulfide thin film. The sample was prepared by the chemical bath deposition method. Several testing were done including, x-ray, transmission and thickness of thin film. z-Scan experiment was performed at two wavelengths (1064 nm and 532 nm) and different energies. The results showed the effect of self-focusing in the material at higher intensities, which evaluated n2 to be (0.11-0.16) cm2/GW. The effect of two-photon absorption was studied, which evaluated β to be (24-106) cm/GW. In addition, the optical limiting behavior has been studied.
... Show MoreThe concept of forming the living space in the American strategic thought has an
important position it is regarded as an strategic movement that it supports the American
United States with the huge capabilities in its own concern that enables it to approach of
American administration , we find that of different historical periods it works to establish that
the geopolitical dimension which is accompanied with the ability of American response for
the evens that in its own turn enables the American united states to seize the growing chances
in the global strategic environment This study includes five chapters :
- Chapter one: The idea of living space.
- Chapter two: Geopolitical dimension of living space theory.
-
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More