Preferred Language
Articles
/
bsj-8545
Further Results on (a, d) -total Edge Irregularity Strength of Graphs
...Show More Authors

Consider a simple graph   on vertices and edges together with a total  labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say  defined by  for all  where  Also, the value  is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by  and is the least  for which G admits   edge irregular h-labeling.  In this article,   for some common graph families are examined. In addition, an open problem is solved affirmatively.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 05 2024
Journal Name
Review Of Clinical Pharmacology And Pharmacokinetics - International Edition
Isolation and characterization of a tetrahydroprotoberberine alkaloid from Crassula ovata
...Show More Authors

The presence of alkaloids in Crassula ovata is a topic that is still unexplored, as there are no published studies on the matter. This study demonstrates the presence of an alkaloid compound (and its class) for the first time in Crassula ovata. The plant material was defatted with n-hexane, and a Soxhlet apparatus was used for the extraction process, while the acid-base method was used for the isolation of alkaloids from the chloroform fractions. The quaternary alkaloid was precipitated from the aqueous layer spontaneously, in high quantity. By using standard spectroscopic methods (including liquid chromatography - mass spectroscopy) we were able to clarify the structure of the precipi¬tated compound as a tetrahydroprotoberberine a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Border disputes between the countries of Latin America (1825 – 1884)
...Show More Authors

The common history of Latin America countries may contribute significantly to determine the initial beginnings of these States since the current borders are a reflection and drawing of the borders of Antarctica according to the divisions determined by the behavior of the Portuguese and Spanish colonialism as well as what the Pope originally called for in order to divide property between Spain and Portugal. A later change took place especially after the independence in the first quarter of the 19th century for the majority of those States which is something that imposed special consideration in the analysis and description of each of these States. There are constants and variables in this case where all the States share constants, while t

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Physics
Structural Properties of Prepared PANI/TiO2 Nanocomposite by Chemical Polymerization
...Show More Authors

A progression of Polyaniline (PANI) and Titanium dioxide (TiO2) nanoparticles (NPs) were prepared by an in-situ polymerization strategy within the sight of TiO2 NPs. The subsequent nanocomposites were analyzed using Fourier-transform infrared spectra (FTIR), X-ray diffraction (XRD), Scanning Electron Microscopy (SEM), and Energy Dispersive X-Ray Analysis (EDX) taken for the prepared samples. PANI/TiO2 nanocomposites were prepared by various compound materials (with H2SO4 0.3 M and without it, to compare the outcome of it) by the compound oxidation technique using ammonium persulfate (APS) as oxidant within the sight of ultrafine grade powder of TiO2 cooled in an ice bath.

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Victorian Society’s Fear of the New Woman in Bram
...Show More Authors

Nineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Features of the approach the Great Prophet Muhammad in Education
...Show More Authors

God sent the Prophet Muhammad as a teacher and promising harbinger {that is sent to the illiterate messenger reciting to them His signs and purifies them and teaches them the Book and Wisdom} [Friday: 2]; the wisdom of Baos Prophet him peace be and am back to teach people, - Education and therefore his life was very rich educational tactics And has passed the Prophet in different circumstances and conditions that can be experienced by a teacher or educator in any time, anywhere; there is no case of going through the educator or teacher only finds the same or similar or likened to, or close to it in the life of the Prophet peace be upon him Prophet has lived God's peace be upon his strengths and weaknesses, victory and defeat, he lived or

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Molecular Typing of Two Suspected Cutaneous Leishmaniasis Isolates in Baghdad
...Show More Authors

Leishmaniasis is a group of parasitic diseases caused by Leishmania spp., an endemic infectious agent in developing countries, including Iraq. Diagnosis of cutaneous lesion by stained smears, serology or histopathology are inaccurate and unable to detect the species of Leishmania. Here, two molecular typing methods were examined to identify the promastigotes of suspected cutaneous leishmaniasis samples, on a species level. The first was species-specific B6-PCR and the second was ITS1-PCR followed by restriction fragment length polymorphism (RFLP) using restriction enzyme HaeIII. DNA was extracted from in vitro promastigote culture followed by amplification of kDNA by B6 or amplification and digestion of LITSR/L

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
on subliminal cryotography
...Show More Authors

in recent years cryptography has played a big role especially in computer science for information security block cipher and public

View Publication Preview PDF
Publication Date
Tue Jan 01 2002
Journal Name
Iraqi Journal Of Science
On Regular Modules
...Show More Authors

Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.

Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Science And Nature
On KU-semigroups
...Show More Authors

Inˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref