Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes while adding a graph G with Kn and deleting an edge e from Kn.
This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the r
... Show MoreIn this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.
The present paper is devoted to studying the imitation of some Quran phrases and words in the tale of "The Leprous Girl". The paper aims at identifying the common ground between the tale and some great stories related in the verses of the holy Quran, and comparing the original work with the present translation. First, we translated the tale from Russian into Arabic so as to be tackled in study, and then an identification of the commonalities between this tale and the Quran wording is made. It was found that texting is clear in the original text of the tale, hence the need for this paper. By studying the texts and phrases employed by the writer, we observe that the text is influenced by the Quranic stories whose effects have been reflecte
... Show More The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_
Several recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreAbstract Background: The emptied sheep’s ovarian follicles recently used as a container for spermatozoa during cryopreservation, it was found a proper carrier to cryopreserving spermatozoa in vapor-dependent cryopreservation. The aim of this study was to evaluate the effect of two periods of exposure to liquid nitrogen (LN2)vapor on the parameter of spermatozoa during cryopreservation in this technique. Method: The study was conducted on 30 semen samples from patients with oligozoospermia diagnosed by semen analysis according to the standard criteria of World Health Orgnization (WHO) 2010. Sheep’s ovarian follicles obtained from local slaughterhouse and prepared by slicing the ovaries and evacuating the follicular fluid and oocyt
... Show MoreIntervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too compl