Preferred Language
Articles
/
ijs-6781
More on Result Involution Graphs
...Show More Authors

     The result involution graph of a finite group , denoted by  is an undirected simple graph whose vertex set is the whole group  and two distinct vertices are adjacent if their product is an involution element. In this paper, result involution graphs for all Mathieu groups and connectivity in the graph are studied. The diameter, radius and girth of this graph are also studied. Furthermore, several other graph properties are obtained.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Construction the linear codes in PG (1, 31)
...Show More Authors

     The goal of this paper is to construct the linear code, and its dual which corresponding to classification of  projective line PG(1,31), we will present Some important results of coding theory, the generator matrix of every linear code in PG(1,31) is found,  A parity check  matrix is  also found . The mathematical programming language GAP was a main computing tool .

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Product of Conjugacy Classes of the Alternating Group An
...Show More Authors

For a nonempty subset X of a group G and a positive integer m , the product of X , denoted by Xm ,is the set Xm = That is , Xm is the subset of G formed by considering all possible ordered products of m elements form X. In the symmetric group Sn, the class Cn (n odd positive integer) split into two conjugacy classes in An denoted Cn+ and Cn- . C+ and C- were used for these two parts of Cn. This work we prove that for some odd n ,the class C of 5- cycle in Sn has the property that = An n 7 and C+ has the property that each element of C+ is conjugate to its inverse, the square of each element of it is the element of C-, these results were used to prove that C+ C- = An exceptio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Improvement Marshall Properties of Hot Mix Asphalt Concrete Using Polyphosphoric Acid
...Show More Authors

Modified asphalt is considered one of the alternatives to address the problems of deficiencies in traditional asphalt concrete, as modified asphalt addresses many of the issues that appear on the pavement layers in asphalt concrete, resulting from heavy traffic and vehicles loaded with loads that exceed the design loads and the large fluctuations in the daily and seasonal temperatures of asphalt concrete. The current study examined the role of polyphosphoric acid (PPA) as a modified material for virgin asphalt when it was added in different proportions (1%, 2%, 3%, 4%) of the asphalt weight. The experimental program includes the volumetric characteristics associated with the Marshall test, the physical properties, and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
A4-Graph of Finite Simple Groups
...Show More Authors

 

Let G be a finite group and X be a conjugacy class of order 3 in G. In this paper, we introduce a new type of graphs, namely A4-graph of  G, as a simple graph denoted by A4(G,X) which has X as a vertex set. Two vertices,  x and y, are adjacent if and only if  x≠y and  x y-1=y x-1. General properties  of the A4-graph as well as the structure of A4(G,X) when G@ 3D4(2) will be studied.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The common bacterial pathogenes isolated from blood culture in paediatric patients
...Show More Authors

Fever is a common illness in the pediatric age group ,the causes could be viral ,bacterial and fungal , this study was focused on bacterial pathogens as gram positive like Staphylococci, coagulase positive or negative ,Streptococci and gram negative like E-coli , Klebsialla ,Proteus, Pseudomonas, Burkhoderia , Acinetobacter and others like Pusturella ,E-alkalescendiaper, Haemophillus influenza and yeast like candida . Four thousand and seventy eight blood samples (4078)were collected in a period between January 2011 and the end of May 2012 at the child welfare hospital ,all the samples were cultured on suitable culture media and then biochemical tests were done using API-E 20 and sugar fermentation tests ,sensitivity

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The extent of the social worker’s use of group discussion technique in professional practice with school activity groups in Tubas Governorate schools
...Show More Authors

This study aimed at identifying the extent to which the social worker used the techniques of group discussion in the professional practice with the groups of school activity in the schools of Tubas governorate in light of some variables (gender, years of experience, academic qualification). The analytical descriptive method was used due to its suitability for the objectives of the study.  A questionnaire was designed to collect data that included (30) items, distributed in three areas .The validity and reliability of the tool were verified and then distributed to the study sample.

 

The results of the study showed that the highest averages were in the discussion stage domain, where the pre-discussion stage was m

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Al-khwarizmi Engineering Journal
Surface Roughness Prediction for Steel 304 In Edm Using Response Graph Modeling
...Show More Authors

Electrical Discharge Machining (EDM) is a non-traditional cutting technique for metals removing which is relied upon the basic fact that negligible tool force is produced during the machining process. Also, electrical discharge machining is used in manufacturing very hard materials that are electrically conductive. Regarding the electrical discharge machining procedure, the most significant factor of the cutting parameter is the surface roughness (Ra). Conventional try and error method is time consuming as well as high cost. The purpose of the present research is to develop a mathematical model using response graph modeling (RGM). The impact of various parameters such as (current, pulsation on time and pulsation off time) are studied on

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
An Evolutionary Bi-clustering Algorithm for Community Mining in Complex Networks
...Show More Authors

A network (or formally a graph) can be described by a set of nodes and a set of edges connecting these nodes. Networks model many real-world phenomena in various research domains, such as biology, engineering and sociology. Community mining is discovering the groups in a network where individuals group of membership are not explicitly given. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem that recently enjoyed a considerable interest. Among the proposed methods, the field of evolutionary algorithms (EAs) takes a remarkable interest. To this end, the aim of this paper is to present the general statement of community detection problem in social networks. Then, it visits the problem as an optim

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref