Let G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
Preparation and Identification of some new Pyrazolopyrin derivatives and their Polymerizations study
Biodiesel can be prepared from various types of vegetable oils or animal fats with the aid of a catalyst.
Calcium oxide (CaO) is one of the prospective heterogeneous catalysts for biodiesel synthesis. Modification
of CaO by impregnation on silica (SiO2) can improve the performance of CaO as catalyst. Egg shells and rice
husks as biomass waste can be used as raw materials for the preparation of the silica modified CaO catalyst.
The present study was directed to synthesize and characterize CaO impregnated SiO2 catalyst from biomass
waste and apply it as catalyst in biodiesel synthesis. The catalyst was synthesized by wet impregnation
method and characterized by x-ray diffraction, x-ray fluorescence, nitr
تحتل أدوات السياسة المالية (الإنفاقية والإيرادية) مكانة مهمة بين أدوات السياسات الاقتصادية الأخرى لما تتمتع به من تأثيرات اقتصادية واجتماعية على مجمل النشاط الاقتصادي .
وفي بحثنا هذا سنركز على الآثار الاجتماعية لأدوات السياسة المالية (الإنفاق العام والإيراد العام) لما للتنمية الاجتماعية من أهمية متزايدة في عالمنا اليوم خاصة فيما يتعلق بمقوماتها غير المادية المتمثلة في خدما
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreBiodegradation is utilizing microorganisms to degrade materials into products that are safe for the
environment, such as carbon dioxide, water, and biomass. The current study aims to isolate and characterize
bacteria with polyethylene terephthalate (PET) degradation ability isolated from Shatt al-Arab water and
sewage from Basra, the bacteria were identified as Klebsiella pneumonia. According to the findings, the
isolates showed a highly significant difference in degradation of PET (24% during 7 days) and the percent of
degradation increased to 46% at 4 weeks compared to the control. The study also involved determining the
optimum temperature of K. pneumonia growth, which was 37°C, while the preferred
Image compression is an important tool to reduce the bandwidth and storage
requirements of practical image systems. To reduce the increasing demand of storage
space and transmission time compression techniques are the need of the day. Discrete
time wavelet transforms based image codec using Set Partitioning In Hierarchical
Trees (SPIHT) is implemented in this paper. Mean Square Error (MSE), Peak Signal
to Noise Ratio (PSNR) and Maximum Difference (MD) are used to measure the
picture quality of reconstructed image. MSE and PSNR are the most common picture
quality measures. Different kinds of test images are assessed in this work with
different compression ratios. The results show the high efficiency of SPIHT algori
Objective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII),
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More