Consider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThis paper performance for preparation and identification of six new complexes of a number of transition metals Cr (lII), Mn (I1), Fe (l), Co (II), Ni (I1), Cu (Il) with: N - (3,4,5-Trimethoxy phenyl-N - benzoyl Thiourea (TMPBT) as a bidentet ligand. The prepared complexes have been characterized, identified on the basis of elemental analysis (C.H.N), atomic absorption, molar conductivity, molar-ratio ,pH effect study, I. Rand UV spectra studies. The complexes have the structural formula ML2X3 for Cr (III), Fe (III), and ML2X2 for Mn (II), Ni (II), and MLX2 for Co (Il) , Cu (Il).
Synthetic polymers such as polyurethane are used widely in the field of biomedical applications such as implants or part of implant systems.
This paper focuses on the preparation of base polymer matrix composite materials by (Hand Lay-Up) method, and studying the effect of selected grain size (32, 53, 63, 75, and 90) µm of (Reenia) particles on some properties of the prepared composite.
Mechanical tests were used to evaluate the prepared system (Tensile, Compression, Impact, and Hardness) tests, and a physical test of (Water absorption %), and all tests were accomplished at room temperature.
Where results showed tensile test (maximum tensile strength and modulus of elasticity) high at small grain size while
... Show MoreThis research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o
... Show More