In this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological spaces, namely o-space and i-space. In chapter four we introduce two new approximation operators using mixed degree systems and comparing of them and we find the accuracy of the second new approximation operator is more thin the first new approximation operator. For reason we study in detail the properties of the second new operator. Finally, in chapter five we introduce new generalization of rough set theory using a finite number of graphs by using the second new approximation operators in the preiow chapter. Several characterizations and properties of these concepts are obtained.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe wound healing process is incredibly intricate, consisting of a series of cellular activities. Although, this complex process has the potential to degenerate and result in chronic wound problems that are resistant to biological healing mechanisms. Nanoparticles can help to reduce inflammation, promote tissue regeneration, and accelerate wound healing. The proteolytic enzymes are believed to break down proteins and other molecules that can cause inflammation and impede the healing process. Wound was created in vivo using adult mice, and by taking blood samples the hematological parameters were evaluated to detected the effects of bromelain, silver nanoparticles and Br-AgNPs. The results shows an increased in white blood cells WBC, RBC, MC
... Show MoreMuscid flies Musca domestica L., M. biseta Hough, M. crassirostris Stein, M. sorbens Wied., Muscina stabulans (Fallen), Atherigona orientalis Schiner, Atherigona sp. and Limnophora quaterna (Loew) were captured by using yellow sticky traps from different provinces of Iraq during November 2010. The results showed the highest percentage of all collected species were recorded in Babylon (48.33%), while the lowest percentage was observed in Baghdad (4.88%). Musca domestica was the predominant species and was ranked first in overall prevalence in all provinces studies, while M. biseta was the lowest abundant specie
The Present study was aimed to evaluate the responses of sixteen species of barley Hordeum vulgar L. cultivated in Iraq against drought stress through treatments of seedling with varying concentrations of Polyethylene glycol (PEG6000) to reach the water stress(-3,-6,-9) in addition to control (without PEG 6000). The results showed variation of barley species in their ability to tolerate the drought stress. For instance, Boraq and Arefat were shown to be the most tolerable species, since their percentage of seeds germination were non significantly affected by the highest water potential (-9) bar, while (bawadi,amal,nor alqadsea and nomar) were shown to be moderately drought tolerable, since their percentage of seeds germ
... Show MoreThis study was conducted to investigate activity and some kinetic
and thermodynamic parameters of adenosine deaminnse (ADA)in
serum in patient affected with P-thalassaemia and compared with that of healthy individuals .Serum AD levels were found to be significantly higher in patient with P-thalassaemia (98±9.15 IU/L) than in healthy individuals (22± 2.04 IUIL)the study was carried in optimum pH value 6.5 and 37c by which the enzyme possess highest activity .The study was concentrated to comprehensive determina
... Show MoreThe Sultanate of Oman is located in the far southwest of the Arabian Peninsula and enjoys a distinctive geographical location as it overlooks the Arabian Gulf and the Gulf of Oman. The Sultanate has good relations with various countries of the world and enjoys an important regional position. At the beginning of 2020, Sultan Qaboos bin Said died, and Haitham bin Tariq assumed power after him, according to the will of his cousin, the late Sultan. The new Sultan had held some important positions before 2020, including: Minister of Heritage and Culture since February 2002, Chairman of the Supreme Committee for the Future Vision (Oman 2040), Secretary-General of the Ministry of Foreign Affairs, Undersecretary of the Ministry of Foreign Affairs f
... Show MoreBlockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show MoreThe study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.