In this work, new kinds of blocking sets in a projective plane over Galois field PG(2,q) can be obtained. These kinds are called the complete blocking set and maximum blocking set. Some results can be obtained about them.
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.
Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreAccurate description of thermodynamic, structural, and electronic properties for bulk and surfaces of ceria (CeO2) necessitates the inclusion of the Hubbard parameter (U) in the density functional theory (DFT) calculations to precisely account for the strongly correlated 4f electrons. Such treatment is a daunting task when attempting to draw a potential energy surface for CeO2-catalyzed reaction. This is due to the inconsistent change in thermo-kinetics parameters of the reaction in reference to the variation in the U values. As an illustrative example, we investigate herein the discrepancy in activation and reaction energies for steps underlying the partial and full hydrogenation of acetyl
... Show MoreBack ground: Cancer is the second leading cause of death throughout the world. Breast cancer, is one of the leading mortality reasons in women from Western Countries, in Iraq, breast cancer is the second reason of death After cardiovascular Diseases.
Material and method:
The study was carried out of period from October/2016-january /2017 and included (90) serum samples for Iraqi women suffered from breast cancer . Samples were divided into two groups ,the first group included (66) patients (females) their age rang (22-55) years which attended to (tumor unit) at medical city educational oncology hospital and Al-Amal Al-Waatanii hospital in Baghdad ,the second group included (38) for
... Show More