The use of silicon carbide is increasing significantly in the fields of research and technology. Topological indices enable data gathering on algebraic graphs and provide a mathematical framework for analyzing the chemical structural characteristics. In this paper, well-known degree-based topological indices are used to analyze the chemical structures of silicon carbides. To evaluate the features of various chemical or non-chemical networks, a variety of topological indices are defined. In this paper, a new concept related to the degree of the graph called "bi-distance" is introduced, which is used to calculate all the additive as well as multiplicative degree-based indices for the isomer of silicon carbide, Si2C3-1[t, h]. The term "bi-distance" is derived from the concepts of degree and distance in such a way that second distance can be used to calculate degree-based topological indices.
In this research, the influence of the distance factor on the optimal working
frequency (FOT) parameter has been studied theoretically for the ionosphere layer
over the Middle East Zone. The datasets of the (FOT) parameter have been
generated using the (VOACAP) model which considers as one of the recommended
modern international communication models that used to calculate the ionosphere
parameters. The calculations have been made for the connection links between the
capital Baghdad and many other locations that distributed on different distances and
directions over the Middle East region. The years (2011-2013) of the solar cycle 24
have been adopted to study the influence of the distance factor on the FOT
param
Used in the study especially calibrated Erwa to determine the number of neighborhood or the Alayoshi number of bacteria in the count modeling and casting method dishes in addition to using the drop method yielded significant results for a match between the methods used ..
In this paper, we introduce the bi-normality set, denoted by , which is an extension of the normality set, denoted by for any operators in the Banach algebra . Furthermore, we show some interesting properties and remarkable results. Finally, we prove that it is not invariant via some transpose linear operators.
Abstract:
Interest in the topic of prediction has increased in recent years and appeared modern methods such as Artificial Neural Networks models, if these methods are able to learn and adapt self with any model, and does not require assumptions on the nature of the time series. On the other hand, the methods currently used to predict the classic method such as Box-Jenkins may be difficult to diagnose chain and modeling because they assume strict conditions.
... Show More
Given a binary matrix, finding the maximum set of columns such that the resulting submatrix has the Consecutive Ones Property (C1P) is called the Consecutive Ones Submatrix (C1S) problem. There are solution approaches for it, but there is also a room for improvement. Moreover, most of the studies of the problem use exact solution methods. We propose an evolutionary approach to solve the problem. We also suggest a related problem to C1S, which is the Consecutive Blocks Minimization (CBM). The algorithm is then performed on real-world and randomly generated matrices of the set covering type.
In this paper we introduce the notions of bi-ideal with respect to an element r
denoted by (r-bi- ideal ) of a near ring , and the notion fuzzy bi- ideal with respect
to an element of a near ring and the relation between F-r-bi-ideal and r-bi-ideal of
the near ring, we studied the image and inverse image of r-bi- ideal under
epimomorphism ,the intersection of r-bi- ideals and the relation between this ideal
and the quasi ideal of a near ring, also we studied the notion intuitionistic fuzzy biideal
with respect to an element r of the near ring N, and give some theorem about
this ideal .
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreIn this paper, game theory was used and applied to the transport sector in Iraq, as this sector includes two axes, the public transport axis and the second axis the private transport axis, as each of these axes includes several types of transport, namely (sea transport, air transport, land transport, transport by rail, port transport) and the travel and tourism sector, as public transport lacks this sector, as the competitive advantage matrix for the transport sector was formed and after applying the MinMax-MaxMin principle to the matrix in all its stages, it was found that there was an equilibrium point except for the last stage where the equilibrium point was not available Therefore, the use of the linear programming method was
... Show MoreIn this work, different soil samples were brought to study and analyse the element concentrations from different middle regions of Iraq (such as, Habbaniah, Garmah, Fallujah, and Tarmiah cities). Using laser-induced breakdown spectroscopy (LIBS) has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyse elements in materials (gases, liquids, and solids) in order to analyse elements in materials (gases, liquids and solid). The Nd:YAG laser excitation source at 1064nm with pulse width and pulse duration of 9ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320 -740 nm.
The soils of Habbaniyah and Garmah citi
... Show MoreThere is not enough studies about bacterial contamination of air condition system in the cars and houses, bacterial detection of such surrounding is necessary for the human environment.
The object of recent study was to evaluate the level of bacterial contamination in air conditioner in cars and houses in Baghdad city, Iraq.
Air samples were taken indoor from cars and house air conditioner in the Baghdad city. The result indicated that gram positive bacteria more than gram negative bacteria in air conditioner. Air condition of cars (20-500 CFU) was more contaminated than of houses (10-100 CFU).
Bacillus was the most frequently bacterial isolates genus with recovery rate B
... Show More