Suppose that is a finite group and is a non-empty subset of such that and . Suppose that is the Cayley graph whose vertices are all elements of and two vertices and are adjacent if and only if . In this paper, we introduce the generalized Cayley graph denoted by that is a graph with vertex set consists of all column matrices which all components are in and two vertices and are adjacent if and only if , where is a column matrix that each entry is the inverse of similar entry of and is matrix with all entries in , is the transpose of and . In this paper, we clarify some basic properties of the new graph and assign the structure of when is complete graph , complete bipartite graph and complete 3-partite graph for every .
Twelve N-(6-sustirured benzothanol-2-y1) succinamic acids and 3-(6-substitted benzonathol-2-y1)-carbamoyl propionyl chloride were synthesized in good yields from reaction of benzonathol2-yl)
In this study, light elements Li ,10B for (a,n) and (n,a) reactions
as well as o-particle energy from threshold energy to 10 MeV are
used according to the available data of reaction cross sections. The
more recent cross sections data of (a,n) and (n,a) reactions are
reproduced in fine steps 42 Kev for 10B(n,o) Li in the specified
energy range, as well as cross section (o,n) Values were derived from
the published data of (n,a) as a function of a-energy in the same fine
energy steps by using the principle inverse reactions. This calculation
involves only the ground state of Li OB in the reactions 'Li(a,n) B
B (n,a) Li
Introduction
When two charged nuclei overcome their Coulomb repulsion, a
rearrangement
Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreBackground and Objective:
There are many treatment modalities in managing complete rectal prolapse (CRP) current study present simple technique of cauterization plication operation in the treatment
of complete rectal prolapse.
Methods:
The study include 30 patients present with CRP their mean age (74.3 ± 4.6), 19 females and 11 males. With the patient under- general anesthesia in litliotomy position the
proolapsed rectum pulled outside the anal canal, the mucosa was cauterized, the muscle layer was plicated by 2/0 dixon suture. Posterior levtorplasty were done in 10 adult patients
when it is indicated.
Results:
The postoperative follow up was 12-24 months. Six had postoperative mucosal prolaps
A topological index, commonly referred to as a connectivity index, is a molecular structural descriptor that describes a chemical compound's topology. Topological indices are a major topic in graph theory. In this paper, we first define a new graph, which is a concept from the coronavirus, called a corona graph, and then we give some theoretical results for the Wiener and the hyper Wiener index of a graph, according to ( the number of pairs of vertices (u, v) of G that are at a distance . Moreover, calculate some topological indices degree-based, such as the first and second Zagreb index, , and index, and first and second Gourava index for the recent graph. In addition, we introduced a new topological index, the , w
... Show MoreBackground: Diabetes mellitus is a major risk factor for chronic periodontitis (CP) and hyperglycemia has an important role in the enhancement of the severity of the periodontitis. It has been reported that the progression of CP causes shifting of the balance between bone formation and resorption toward osteoclastic resorption, and this will lead to the release of collagenous bone breakdown products into the local tissues and the systemic circulation. Cross-linked N-telopeptide of type I collagen (NTx) is the amino-terminal peptides of type I collagen which is released during the process of bone resorption. This study was conducted to determine the effects of nonsurgical periodontal therapy on serum level of NTx in type 2 diabetic patients
... Show MoreThe ï¤- Multiple mixing ratios of ï§-transitions from levels of 56Fe populated in 56 56 ( , ) Fe n n Fe ï§ ï‚¢ reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitionsØŒ in our work we used This method for mixed ï§ - transitions in addition to pure ï§ - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet ï¤- values. It is clear from the results that the ï¤- values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur
... Show MoreOur work included a synthesis of three new imine derivatives—1,3-thiazinan-4-one, 1,3-oxazinan-6-one and 1,3-oxazepin-4,7-dione—which contained an adamantyl fragment. These were produced via the condensation of the Schiff`s base (E)-N-(adamantan-1-yl)-1-(3-aryl)methanimine with 3-mercaptopropanoic acid; 3-chloropropanoic acid; and maleic, citraconic anhydride, respectively. These new imines were prepared via the condensation of adamantan-1-ylamine and 3-nitro-, 3-bromobenzaldehyde in n-BuOH. We obtained a good yield of products. FTIR, 1H NMR spectroscopy and C.H.N.S analysis were used to diagnostic the products. The molecular structure of (E)-N-(adamantan-1-yl
... Show MoreThe recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re
... Show More