In this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases; a circle and an ellipse, and all figures and obtained rigour measurements are checked by AutoCAD program. With its simple, symmetric form, the future predictions are tuned for the Noor's curve to be usefully engaged in important practical applications.
Abstract
Epidemics that afflict humankind are descending renewed, plaguing them in the place and time they spread.
- The epidemic affects individuals and the movement of societies, and its treatment requires dealing with it according to Sharia, taking into account the current data and developments.
- Integrative jurisprudence: it is intended to know the practical legal rulings deduced from the combination of evidence of two or more sciences related to one topic related to it, and among these calamities is the Corona Covid-19 pandemic.
- It is permissible to use sterile materials that contain a percentage of alcohol in sterilizing hands and fogging places, including mosques.
T
... Show MoreThe study examines the religious references of the art of miniatures in the Iranian school "Bahzad model" completed in Iran during the twelfth century AH, according to the controls and characteristics of the authoritative references. The researcher presented the problem of research, its importance, the need for it and its purpose, defined the terms in the research. The theoretical framework came with three investigations. The first topic of the concept of the reference in the field of knowledge, which concluded the most important features of the reference, is that each symbolic existence corresponds to a real existence and symbolic presence is an input to the realization of the reference. The reference then becomes a sign that acts as a
... Show MoreIn this paper, we will illustrate a gamma regression model assuming that the dependent variable (Y) is a gamma distribution and that it's mean ( ) is related through a linear predictor with link function which is identity link function g(μ) = μ. It also contains the shape parameter which is not constant and depends on the linear predictor and with link function which is the log link and we will estimate the parameters of gamma regression by using two estimation methods which are The Maximum Likelihood and the Bayesian and a comparison between these methods by using the standard comparison of average squares of error (MSE), where the two methods were applied to real da
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAllopurinol derivative were prepared by reacting the (1-chloroacetyl)-2-Hydropyrazolo{3,4-d}pyrimidine-4-oneiwith 5- methoxy- 2-aminoibenzothiazoleiunder certain conditions to obtain new compound ( N- (2-aminoacetyl (5-methoxy) benzothiazole -2yl) (A4), Reaction of 5-(P-dimethyl amine benzene)-2-amino-1,3,4- oxadiazole in the presence of potassium carbonate anhydrous to yield new compound (N-(2- aminoacetyl-5-(P-dimethyl amine benzene )-1,3,4-oxadiazoles-2-yl)(A30) and Azo compound (N-(5-(Azo-2-hydroxy-5-amino benzene)-1,3-Diazol-2yl)Allopurinol(A46). The structure of prepared compounds were confirmed by (FT-IR)
... Show MoreIs in this research review of the way minimum absolute deviations values based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.
Contemporary life is racing against time in its temptations and variables, and it has become shaped and changed in an amazing way in its various aspects and fields. This was facilitated by intellectual and scientific communication between civilizations, and the rapid progression in successive inventions and discoveries in the fields of science and arts of knowledge. This contributed to a great economic and commercial renaissance. Then, these economic developments entered the world into a very strong competition, which forced producers to calculate all production costs, to reach the highest profits by reducing the price of the produced commodity on the one hand, and achieving quality in appearance (especially) on the other hand. Since the ma
... Show MoreAccurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show More