Preferred Language
Articles
/
bsj-8417
Stability of Complement Degree Polynomial of Graphs
...Show More Authors

     A graph is a structure amounting to a set of objects in which some pairs of the objects are in some sense related. The objects correspond to mathematical abstractions called vertices (also called nodes or points) and each of the related pairs of vertices is called an edge (also called link or line). A directed graph is a graph in which edges have orientation. A simple graph is a graph that does not have more than one edge between any two vertices and no edge starts and ends at the same vertex.  For a simple undirected graph G with order n, and let  denotes its complement. Let δ(G), ∆(G) denotes the minimum degree and maximum degree of G respectively. The complement degree polynomial of G is the polynomial CD[G,x]= , where Cdi(G) is the cardinality of  the set of vertices of degree i in . A multivariable polynomial f(x1,...,xn) with real coefficients is called stable if all of its roots lie in the open left half plane.  In this paper, investigate the stability of complement degree polynomial of some graphs.

2020 Mathematics Subject Classification:  05C31, 05C50

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
The Composition operator induced by a polynomial of degree n
...Show More Authors

In this paper, we characterize normal composition operators induced by holomorphic self-map , when and .Moreover, we study other related classes of operators, and then we generalize these results to polynomials of degree n.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Schultz and Modified Schultz Polynomials for Edge – Identification Chain and Ring – for Square Graphs
...Show More Authors

In a connected graph , the distance function between each pair of two vertices from a set vertex  is the shortest distance between them and the vertex degree  denoted by  is the number of edges which are incident to the vertex  The Schultz and modified Schultz polynomials of  are have defined as:

 respectively, where the summations are taken over all unordered pairs of distinct vertices in  and  is the distance between  and  in  The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Detour Polynomial of Theta Graph
...Show More Authors

     Let  be any connected graph with vertices set  and edges set .  For any two distinct vertices  and , the detour distance between  and  which is denoted by  is a longest path between  and  in a graph . The detour polynomial of a connected graph  is denoted by ;  and is defined by . In this paper, the detour polynomial of the theta graph and the uniform theta graph will be computed.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Nov 09 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The effect of different thermal treatments and pH on the stability of a glycyrrhizin which Product from the licorice plant, Glycyrrhiza glabra L: The effect of different thermal treatments and pH on the stability of a glycyrrhizin which Product from the licorice plant, Glycyrrhiza glabra L
...Show More Authors

The plant licorice is considered important plants as nutritionally and medically and economically, as a rich in phytochemical, vitamins and minerals, and being widely available, Research indicated the presence of many nutrients such as (proteins, Carbohydrates, vitamins and minerals) as well as presence of Glycyrrhizin which responsible of sweet taste, that allowing the possibility to use it as natural intensity sweetener with few calories in Sweetening of many food. This research is aimed to study the Stability of Glycyrrhizin toward the various manufacturing conditions such as (thermal treatment, pH of foods and microwaves), so three factorial experiments was implemented to find out the Stability as following: 100C° - 121C° - Microwa

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
On ST-essential (complement) submodules
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Topological Structures on Vertex Set of Digraphs
...Show More Authors

Relation on a set is a simple mathematical model to which many real-life data can be connected. A binary relation  on a set  can always be represented by a digraph. Topology on a set  can be generated by binary relations on the set . In this direction, the study will consider different classical categories of topological spaces whose topology is defined by the binary relations adjacency and reachability on the vertex set of a directed graph. This paper analyses some properties of these topologies and studies the properties of closure and interior of the vertex set of subgraphs of a digraph. Further, some applications of topology generated by digraphs in the study of biological systems are cited.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Nordhaus-Gaddum Type Relations on Open Support Independence Number of Some Path Related Graphs Under Addition and Multiplication
...Show More Authors

In this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.

View Publication Preview PDF
Scopus Clarivate Crossref