In this paper we introduce two Algorithms, the first Algorithms when it is odd order and how we calculate magic square and rotation for it. The second Algorithms when it be even order and how to find magic square and rotation for it.
The results of theoretical and experimental investigations carried out to study the effect of load and relative sliding speed on the abrasive wear behavior in drilling bit teeth surfaces of an insert tungsten carbide bit have been presented. Experimentally, an apparatus for abrasive wear tests conducted on the modified ASTM-G65 was modified and fabricated to facilitate loading and measurement of wear rate for the sand/ steel wheel abrasion test, which involves two cases of contact; first is at dry sand and second is under wet condition. These tests have been carried under varied operating parameters of normal load and sliding speed. A theoretical model based upon the Archard equation has been developed for predicting wear simulation by u
... Show MoreThe importance of television has emerged as an effective and influential force in the lives of societies and peoples, And not just a professional media since the fifties of the twentieth century, It was used as a platform to achieve the goals and objectives of the media and politics for governments, agencies and individuals in different countries of the world, Using many methods, methods and techniques that later became important major subjects and curricula and a scientific specialization that was founded for him to study and teach in most international universities, The media, especially television and satellite channels, play an active and significant role in managing crises and conflicts and directing them through the methods of deal
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi
... Show MoreIn this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better
PVA:PEG/MnCl2 composites have been prepared by adding (MnCl2) to the mixture of the poly vinyl alcohol (PVA) and poly ethylene glycol (PEG) with different weight percentages (0, 2, 4, 6, 8 and 10) wt.% by using casting method. The type of charge carriers, concentration (nH) and Hall mobility (μH) have been estimated from Hall measurements and show that the films of all concentration have a negative Hall coefficient. In D.C measurement increase temperature leads to decrease the electrical resistance. The D.C conductivity of the composites increases with the increasing of the concentration of additive particles and temperature. The activation energy decreases for all composites with increasing the concentration of the additive particles.
... Show MoreIn this study, plastic wastes named (PET and PVC) were used to prepare polymer matrix composite (PMC) which can be used in different applications. Composite materials were prepared by mixing unsaturated polyester resin (UP) with plastic wastes, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with various weight fractions (0, 5,10,15, 20 and 25%) added as a filler in flakes form. In this work, some of the tests that were carried out included (tensile, bending, and compressive strength) as mechanical tests, in addition to (thermal conductivity and water absorption) as physical tests. The values of tensile, compressive strength and Young's modulus of UP increased after
... Show MoreThe research aims to present a proposed strategy for the North Oil Company, and the proposed strategy took into account the surrounding environmental conditions and adopted in its formulation on the basis and scientific steps that are comprehensive and realistic, as it covered the main activities of the company (production and exploration activities, refining and refining activities, export and transport of oil, research and development activity, financial activity, information technology, human resources) and the (David) model has been adopted in the environmental analysis of the factors that have been diagnosed according to a
... Show MoreSeveral attempts have been made to modify the quasi-Newton condition in order to obtain rapid convergence with complete properties (symmetric and positive definite) of the inverse of Hessian matrix (second derivative of the objective function). There are many unconstrained optimization methods that do not generate positive definiteness of the inverse of Hessian matrix. One of those methods is the symmetric rank 1( H-version) update (SR1 update), where this update satisfies the quasi-Newton condition and the symmetric property of inverse of Hessian matrix, but does not preserve the positive definite property of the inverse of Hessian matrix where the initial inverse of Hessian matrix is positive definiteness. The positive definite prope
... Show MoreThis study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show More