This study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Praise be to God, Lord of the worlds, and the best of prayers, and extradition was made to our master Muhammad and his whole family and companions:
And after:
Surat Al-Qariah is from the royal fence, which is in the thirtieth part of the Noble Qur’an. The commentators differed on the number of verses, and the reason for its naming. This surah talked about the conditions of people on the Day of Resurrection, and about how people were removed from their graves, all of which I spoke about in the preamble.
The research is divided into six topics: the first topic dealt with strange terms, while the second topic dealt with the most important audio issues mentioned in the surah, namely (slurring, advertising, substitution, and silenc
Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show MoreA new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten
... Show MoreIn this work, the preparation of new multidentate Schiff-base lig and and its metal complexes are described. The formation of the lig and{ 2,2`((5-methyl-1,3-phenylene)-bis-(oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}[H2L] was prepared from the reaction {2,2-((5-methyl-1,3-phenylene)-bis-(oxy))- di-(acetohydrazide)}[M]precursor and salicylaldehyde in a 1:2 mole ratio, respectively. The reaction of the lig and [H2L] with (Cr+3 , Mn+2 and Fe+2 )metal ions in a 1:2 (L:M) mole ratio. Ligand and complexes were characterised via spectroscopic analyses; [FT-IR, UV-Vis spectroscopy,(C.H.N) microanalysis, chloride content, thermal analysis(TG), electrospray mass, magnetic susceptibility and conductivity measurements. The characterisation d
... Show Moreالوصف A simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5, 6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro (carboxylic) methylidene]-5, 6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl (6-methyl-2-pyridylmethyl) amine to create a new ligand (ONMILA). This novel ligand was identified using
... Show More
