For a nonempty subset X of a group G and a positive integer m , the product of X , denoted by Xm ,is the set Xm = That is , Xm is the subset of G formed by considering all possible ordered products of m elements form X. In the symmetric group Sn, the class Cn (n odd positive integer) split into two conjugacy classes in An denoted Cn+ and Cn- . C+ and C- were used for these two parts of Cn. This work we prove that for some odd n ,the class C of 5- cycle in Sn has the property that = An n 7 and C+ has the property that each element of C+ is conjugate to its inverse, the square of each element of it is the element of C-, these results were used to prove that C+ C- = An exceptional of I (I the identity conjugacy class), when n=5+4k , k>=0.
In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreResearch aims to develop a novel technique for segmental beam fabrication using plain concrete blocks and externally bonded Carbon Fiber Reinforced Polymers Laminates (CFRP) as a main flexural reinforcement. Six beams designed an experimentally tested under two-point loadings. Several parameters included in the fabrication of segmental beam studied such as; bonding length of carbon fiber reinforced polymers, the surface-to-surface condition of concrete segments, interface condition of the bonding surface, and thickness of epoxy resin layers. Test results of the segmental beams specimens compared with that gained from testing reinforced concrete beam have similar dimensions for validations. The results show the effectiven
... Show MoreAn analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreObjective: To determine the effectiveness of an Educational Program in Enhancing Nurse’s Knowledge about Occupational Health Hazards at Medical City Hospitals in Baghdad City.
Methodology: The present study employed a quasi-experimental design held at Medical City Hospitals in Baghdad City. A non-probability sample (convenience sample) consisted of (60) nurse. Data were collected by using a self-report questionnaire which consisted of six parts (a) socio-demographic characteristics (b) physical hazards knowledge (c) chemical hazards knowledge (d) biological hazards knowledge (e) psychological hazards knowledge and (f) mechanical hazards knowledge. Data were analyzed using the statistical packag
... Show MoreCo-crystals are new solid forms of drugs that could resolve more than one problem associated with drugs formulations like solubility, stability, bioavailability, mechanical and tableting properties. A preliminary theoretical study for estimating the possible bonding between the co-crystal components (paracetamol and naproxen) was performed using the ChemOffice program. The results revealed a high possibility for bonding between paracetamol and naproxen and indicated the ability of molecular mechanics study to predict the co-crystal design.
In this work, four different methods were used for the preparation of three different ratios 1:1, 2:1, and 1:2 of paracetamol:naproxen co-crystals. The four
... Show MoreABSTRACT: Ultimate bearing capacity of soft ground reinforced with stone column was recently predicted using various artificial intelligence technologies such as artificial neural network because of all the advantages that they can offer in minimizing time, effort and cost. As well as, most of applied theories or predicted formulas deduced analytically from previous studies were feasible only for a particular testing environment and do not match other field or laboratory datasets. However, the performance of such techniques depends largely on input parameters that really affect the target output and missing of any parameter can lead to inaccurate results and give a false indicator. In the current study, data were collected from previous rel
... Show More