Preferred Language
Articles
/
ijs-494
Resultant Graphs of Block Designs
...Show More Authors

In this paper we have made different regular graphs by using block designs. In one of our applicable methods, first we have changed symmetric block designs into new block designs by using a method called a union method. Then we have made various regular graphs from each of them. For symmetric block designs with  (which is named finite projective geometry), this method leads to infinite class of regular graphs. With some examples we will show that these graphs can be strongly regular or semi-strongly regular. We have also propounded this conjecture that if two semi-symmetric block designs are non-isomorphic, then the resultant block graphs of them are non-isomorphic, too.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Unification of Generalized pre-regular closed Sets on Topological Spaces
...Show More Authors

      This paper intends to initiate a new type of generalized closed set in topological space with the theoretical application of generalized topological space. This newly defined set is a weaker form than the -closed set as well as -closed set. Some phenomenal characterizations and results of newly defined sets are inculcated in a proper manner. The characteristics of normal spaces and regular spaces are achieved in the light of the generalized pre-regular closed set.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Coefficient Estimates for Subclasses of Regular Functions
...Show More Authors

The aim of this paper is to introduce and investigate new subclasses of regular functions defined in . The coefficients estimate and  for functions in these subclasses are determined. Many of new and known consequences are shown as particular cases of our outcomes.

View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
The Discs Structures of A4-Graph for the Held Group
...Show More Authors

     Let G be a finite group and X be a G-conjugacy of elements of order 3. The A4-graph of G is a simple graph with vertex set X and two vertices x,yÎX are linked if x≠ y and xy-1 is an involution element. This paper aims to investigate  the A4-graph properties for the monster  Held group He.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Solving of Chromatic Number, Chromatic Polynomial and Chromaticity for a Kind of 6-Bridge Graph Using Maplesoft
...Show More Authors

Maplesoft is a technical computation forms which is a heart of problem solving in mathematics especially in graph theory. Maplesoft has established itself as the computer algebra system for researchers. Maplesoft has more mathematical algorithms which is covering a wide range of applications. A new family ( ) of 6-bridge graph still not completely solved for chromatic number, chromatic polynomial and chromaticity. In this paper we apply maplesoft on a kind of 6-bridge graph ( ) to obtain chromatic number, chromatic polynomial and chromaticity. The computations are shown that graph contents 3 different colours for all vertices, 112410 different ways to colour a graph such that any two adjacent vertices have different colour by using 3 dif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 31 2020
Journal Name
Bmc Oral Health
The success of using 2% lidocaine in pain removal during extraction of mandibular premolars: a prospective clinical study
...Show More Authors
Abstract<sec><title>Background

The purpose of this study was to evaluate the anesthetic effectiveness of a buccal infiltration technique combined with local massage (using 2% lidocaine) in the extraction of mandibular premolars to be utilized as an alternative to the conventional inferior alveolar nerve block.

Methods

Patients eligible included any subject with a clinical indication for tooth extraction of the mandibular 1st or 2nd premolars. All patients were anesthetized buccally by local infiltration technique followed by an external pressure applied for 1 min directly over the injection area. In each case, another local

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
In vitro Radio Protective Effects of Metformin on Human Lymphocytes Irradiated with Gamma Rays
...Show More Authors

     Radio protective effects of metformin and its ability to alter the spontaneous and induced genotoxic and cytotoxic levels effects on human peripheral blood lymphocytes were investigated in this study. Metformin, a hypoglycemic oral drug,  is a biguanide derived from Galega officinalis that is widely utilized in controlling type 2 diabetes mellitus. Whole blood samples from 10 healthy donors (5 males and 5 females) were exposed to two doses of gamma-rays (1 and 2 Gray). Lymphocytes in cultures were treated with metformin (10 and 50µM) before gamma-irradiation. Cytokinesis-block micronucleus test was used to evaluate the protective effects of metformin on radiation induced genomic damage, cytostasis and

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Nov 01 2021
Journal Name
University Of Baghdad, College Of Education For Pure Sciences \ Ibn Al-haitham, Department Of Mathematics
SOME ALPHA-TOPOLOGICAL CONCEPTS USING GRAPH THEORY
...Show More Authors

This dissertation depends on study of the topological structure in graph theory as well as introduce some concerning concepts, and generalization them into new topological spaces constructed using elements of graph. Thus, it is required presenting some theorems, propositions, and corollaries that are available in resources and proof which are not available. Moreover, studying some relationships between many concepts and examining their equivalence property like locally connectedness, convexity, intervals, and compactness. In addition, introducing the concepts of weaker separation axioms in α-topological spaces than the standard once like, α-feebly Hausdorff, α-feebly regular, and α-feebly normal and studying their properties. Furthermor

... Show More
Publication Date
Wed Jun 06 2001
Journal Name
المجلة العراقية للعلوم الاحصائية
Suggest formulas for estimating carry-over effects in two-period changeover design
...Show More Authors

This research aims to suggest formulas to estimate carry-over effects with two-period change-over design, and then, all other effects in the analysis of variance of this design, and find the efficiency of the two-period change-over design relative to another design (say, completely randomized design).

Preview PDF