A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.
Original Research Paper Mathematics 1-Introduction : In the light of the progress and rapid development of the applications of research in applications fields, the need to rely on scientific tools and cleaner for data processing has become a prominent role in the resolution of decisions in industrial and service institutions according to the real need of these methods to make them scientific methods to solve the problem Making decisions for the purpose of making the departments succeed in performing their planning and executive tasks. Therefore, we found it necessary to know the transport model in general and to use statistical methods to reach the optimal solution with the lowest possible costs in particular. And you know The Transportatio
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreVolterra – Fredholm integral equations (VFIEs) have a massive interest from researchers recently. The current study suggests a collocation method for the mixed Volterra - Fredholm integral equations (MVFIEs)."A point interpolation collocation method is considered by combining the radial and polynomial basis functions using collocation points". The main purpose of the radial and polynomial basis functions is to overcome the singularity that could associate with the collocation methods. The obtained interpolation function passes through all Scattered Point in a domain and therefore, the Delta function property is the shape of the functions. The exact solution of selective solutions was compared with the results obtained
... Show MoreIn this work, PAni nanofibers (NFs) are successfully synthesized via hydrothermal method. The structural, surface morphological, optical, electrical and H2S gas sensing properties have been investigated for PAni thin films deposited by spin coating technique. The XRD pattern reveals crystalline nature of PAni NFs with crystallite size of 9.2 nm. The SEM image of Polyaniline clearly indicates that the polymer possesses nanofiber like structure. The optical properties show that the optical energy gap follows allowed direct electronic transition calculated using Tauc’s equation. Intense hotoluminescence (PL) peaks at 309, 340 and 605 nm are observed. The electrical properties such as D.C. conductivity and Hall effect have been studied wher
... Show MoreThe removal of boron from aqueous solution was carried out by electrocoagulation (EC) using magnesium electrodes as anode and stainless steel electrodes as cathode. Several operating parameters on the removal efficiency of boron were investigated, such as initial pH, current density, initial boron ion concentration, NaCl concentration, spacing between electrodes, electrode material, and presence of carbonate concentration. The optimum removal efficiency of 91. 5 % was achieved at a current density of 3 mA/cm² and pH = 7 using (Mg/St. St. ) electrodes, within 45 min of operating time. The concentration of NaCl was o. 1 g/l with a 0.5cm spacing between the electrodes. First and second order rate equation were applied to study adsorp
... Show MoreThe increase in obesity and the many accompanying diseases is attributed to the increased production and consumption of foods made of non-nutritive sweeteners without regard to the risks of consuming additional calories, and this in turn leads to hormonal imbalance and metabolic disorders and the resulting imbalance and ill health that have spread to all segments of society. During the research, 0.01, 0.02, 0.03, 0.04 and 0.05 % of stevia sweetener was added to the cream instead of the sugar used. Physical and chemical tests were performed for the stevia extract and the microbial content in the cream, as well as the sensory evaluation. It was noted that fortifying the cream with calorie-free stevia sugar led to the production of
... Show MoreThe 3-aminoacetophenone and 4-aminoantipyrine were used as precursors to prepare new six ligands. The three new ligands (L1,L2 and L3) were synthesis by reacting one mole of 3-aminoacetophenone with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thiocyanat in acetone as a solvent, they are:- L1 (AAA) =[N-(3-acetylphenylcarbamothioyl)acetamide] L2 (BAA) =[N-(3-acetylphenylcarbamothioyl)benzamide] L3 (MAA) =[N-(3-acetylphenylcarbamothioyl)-4-methoxy benzamide] Also three new derivatives of 4-aminoantipyrine were synthesis by reacting one mole of 4-aminoantipyrine with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thio
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t