The aim of this paper is to construct the (k,r)-caps in the projective 3-space PG(3,p) over Galois field GF(4). We found that the maximum complete (k,2)-cap which is called an ovaloid , exists in PG(3,4) when k = 13. Moreover the maximum (k,3)-caps, (k,4)-caps and (k,5)-caps.
A series of new 1,3,4- oxadiazole derivatives and cyclic Imides containing Creatinine
heterocyclic molecule were prepared via following method:first step included Synthesis of
amic acid from reaction between different cyclic anhydrides with Creatinine which
subsequently dehydrated to the corresponding imide via treatment with acetic anhydride
and anhydrous sodium acetate,.then,second step was tratedamic acid with Thionyl chloride
producing acid chloride which on amination with hydrazine hydrate in thierd step and the
last turn to 1,3,4-oxadiazole derivatives by condensation reaction with Phosphorous
Oxychloride(POCl3) and different benzoic acids. Cyclization to 1, 3, 4-Oxadiazole
derivatives. Antibacterial activit
Background and Objective:
There are many treatment modalities in managing complete rectal prolapse (CRP) current study present simple technique of cauterization plication operation in the treatment
of complete rectal prolapse.
Methods:
The study include 30 patients present with CRP their mean age (74.3 ± 4.6), 19 females and 11 males. With the patient under- general anesthesia in litliotomy position the
proolapsed rectum pulled outside the anal canal, the mucosa was cauterized, the muscle layer was plicated by 2/0 dixon suture. Posterior levtorplasty were done in 10 adult patients
when it is indicated.
Results:
The postoperative follow up was 12-24 months. Six had postoperative mucosal prolaps
In this work, prepared new ligand[3- (1H-indol-3-yl) -2- (3-(4- methoxybenzoyl)thiouereido) propanoic acid](MTP) has been synthesized by reaction of 4-Methoxybenzoyl isothiocyanate with tryptophane(1:1), The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13C NMR spectra, Some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MTP)2] (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg), the proposed geometrical structure for all complexes were tetrahedral except copper complex has a square planer geometry around metallic ion
... Show MoreIn this paper further properties of the fuzzy complete a-fuzzy normed algebra have been introduced. Then we found the relation between the maximal ideals of fuzzy complete a-fuzzy normed algebra and the associated multiplicative linear function space. In this direction we proved that if is character on Z then ker is a maximal ideal in Z. After this we introduce the notion structure of the a-fuzzy normed algebra then we prove that the structure, st(Z) is -fuzzy closed subset of fb(Z, ) when (Z, , , ) is a commutative fuzzy complete a-fuzzy normed algebra with identity e.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThis research aims to give a splitting structure of the projective line over the finite field of order twenty-seven that can be found depending on the factors of the line order. Also, the line was partitioned by orbits using the companion matrix. Finally, we showed the number of projectively inequivalent -arcs on the conic through the standard frame of the plane PG(1,27)
This study deal with structural and stratigraphic analysis of the seismic reflection data for Hartha Formation at Nasiriyah field, the area of seismic data is about (1237) km2. Nasiriyah oil field is located in Dhi Qar Governorate, southern Iraq, and the oil field is located to the East of Euphrates River of about (38) km northwest of Nasiriyah city. which includes twenty-four (24) wells. In some wells there are oil evidences in Hartha Formation at Nasiriyah oil field, for this reason, Hartha Formation is studied.
Two reflectors are picked (top and bottom Hartha) they are defined by using synthetic seismograms in time domain for wells (Ns-1, and 3). Time and depth of Hartha Formation are drawn using velocity data of reflectors. The st
Experimental work has been performed on three capillary tubes of different lengths and diameters using R-12 and R-134a. The test also studies the effect of discharge and speed of evaporator fan. The results clearly showed that refrigerant type and discharge significantly influence the temperature drop across the capillary tube. While the speed of evaporator fan has small effect. Experimental results showed that the temperature gradient for the two refrigerants are the same, but after approximatly one meter the temperature gradient of R-134a is steeper than R-12.
In recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to