In this paper, the packing problem for complete ( 4)-arcs in is partially solved. The minimum and the maximum sizes of complete ( 4)-arcs in are obtained. The idea that has been used to do this classification is based on using the algorithm introduced in Section 3 in this paper. Also, this paper establishes the connection between the projective geometry in terms of a complete ( , 4)-arc in and the algebraic characteristics of a plane quartic curve over the field represented by the number of its rational points and inflexion points. In addition, some sizes of complete ( 6)-arcs in the projective plane of order thirteen are established, namely for = 53, 54, 55, 56.
The title compound, [Ru3(μ3-NC6H4Br)2(CO)9], is a V-shaped triruthenium cluster, each side of the V being face-capped by a 4-bromophenylimide ligand. Each Ru atom is also ligated by three terminal carbonyl ligands. There are two molecules in the asymmetric unit with minor conformational differences.
Water resources would be differentiate in Morocco specially in Morocco which appear as form of eyes ,rivers as dissolved water of mountain.
The human takes care of water either as rains to store and use in necessity trying to bring it to Maracas by helping from state
Water resources would be differentiate in Morocco specially in Morocco which appear as form of eyes ,rivers as dissolved water of mountain.
The human takes care of water either as rains to store and use in necessity trying to bring it to Maracas by helping from state .
The religious tried to dig wells to emphasize that water is rumored and do not monopolized.
Fumonisin B1 is toxic secondary metabolites compound produced by Fusarium spp. on maize and maize products causes health problems to human and animal. Therefore, this research is planned to study the effect of FB1 on the expression of TLR-2 & 4 in liver and kidney cells of mice. Four group of male mice were orally administrated with single dose of FB1 toxin as the following: 0 ppb, 800 ppb, 1200 ppb and 1600 ppb. After two weeks all animals were sacrificed, liver and kidney autopsies were taken and the level of TLR-2 & 4 detected in each four group by immunohistochemistry technique (IHC). According to the IHC examination of groups (1, 2, 3 and 4) strong expression of TLR2 in liver and kidney were (0%, 33.3%, 100%, 100%), respectively. This
... Show MoreThe research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both
In this work, excess properties (eg excess molar volume (VE), excess viscosity (ȠE), excess Gibbs free energy of activation of viscos flow (ΔG* E) and molar refraction changes (ΔnD) of binary solvent mixtures of tetrahydrofurfuryl alcohol (THFA) with aromatic hydrocarbons (benzene, toluene and p-xylene) have been calculated. This was achieved by determining the physical properties including density ρ, viscosity Ƞ and refraction index nD of liquid mixtures at 298.15 K. Results of the excess parameters and deviation functions for the binary solvent mixtures at 298.15 K have been discussed by molecular interactions that occur in these mixtures. Generally, parameters showed negative values and have been found to fit well to Redlich-Kister
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreLaser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shap
... Show More