In this paper, a new idea to configure a special graph from the discrete topological space is given. Several properties and bounds of this topological graph are introduced. Such that if the order of the non-empty set equals two, then the topological graph is isomorphic to the complete graph. If the order equals three, then the topological graph is isomorphic to the complement of the cycle graph. Our topological graph has complete induced subgraphs with order or more. It also has a cycle subgraph. In addition, the clique number is obtained. The topological graph is proved simple, undirected, connected graph. It has no pendant vertex, no isolated vertex and no cut vertex. The minimum and maximum degrees are evaluated. So , the radius and diameter are studied here.
The Multiplicative Cyclic Group has been used to construct a New Digital Algebraic Generator System (NDAGS). This cryptosystem can be classified as a stream cipher cryptosystem. In this paper we will estimate the efficiency and security of the (NDAGS) by using the Basic Efficiency Criteria (BEC). A comparison has made between the some known generators and (NDAGS). The results of applying the BEC and the comparison results proof the high efficiency of the (NDAGS).
This research includes the synthesis of some new nucleoside analogues via 1,3-
dipolar cycloadditon reaction starting with 1,3,4,6- Tetra- O-benzoyl –2 – azido-2-
deoxy- β – D- fructofuranose (F3) which was prepared in three steps ,protection
(benzoylation ) , bromination and azotation ((F1-F3) from D- fructose as sugar
moiety while the base moiety , 2-substituted benzimidaole derivatives (A1-A5)
were synthesized by condensation of O-phenylenediamine with different aromatic
aldehyde .
Nucleophilic substitution of propargyl bromide with benzimidaole derivatives (gave
the N- substituted compounds (B1-B5) which were reacted with azido sugar through
1,3- dipolar cycloadditon reaction to give nucleoside analo
A newly developed analytical method was conducted for the determination of Ketotifen fumarate (KTF) in pharmaceuticals drugs via quenching of continuous fluorescence of 9(10H)-Acridone (ACD). The method was applied using flow injection system of a new homemade ISNAG fluorimeter with fluorescence measurements at ± 90◦ via 2×4 solar cell. The calibration graph was linear in the range of 1-45 mmol/L, with correlation coefficient r = 0.9762 and the limit of detection 29.785 µg/sample from the stepwise dilution for the minimum concentration in the linear dynamic ranged of the calibration graph. The method was successfully applied to the determination of Ketotifen fumarate in two different pharma
... Show MoreThe aim of this paper is to obtain a set of traveling wave solutions for klein –Gorden equation with kerr law non-linearity. More precisely, we apply a new path of popularized homogeneous balance (HB) method in terms of using linear auxiliary equations to find the results of non-linear klein-Gorden equation, which is a fundamental approach to determine competent solutions. The solutions are achieved as the integration of exponential, hyperbolic, trigonometric and rational functions. Besides, some of the solutions are demonstrated by the3D graphics.
The new ligand [3,3’-(1,2-phenylenebis(azanediyl))bis(5,5-dimethylcyclohex-2-en-1-one)] (L) derived from 5,5-Dimethylcyclohexane-1,3-dione with 1,2-phenylenediamine was used to prepare a new chain of metal complexes of Mn(ii), Co(ii), Ni(ii), Cu(ii), Cd(ii) and Zn(ii) by inclusive formula [M(L)]Cl2. Characterized compounds on the basis of 1H, 13CNMR (for ligand (L)), FT-IR and U.V spectrum, melting point, molar conduct, %C, %H and %N, the percentage of the metal in complexes %M, Magnetic susceptibility, thermal studies (TGA), while its corrosion inhibition for (plain steel) in tap water is studied by weight loss. These measurements proved th
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreSeveral stress-strain models were used to predict the strengths of steel fiber reinforced concrete, which are distinctive of the material. However, insufficient research has been done on the influence of hybrid fiber combinations (comprising two or more distinct fibers) on the characteristics of concrete. For this reason, the researchers conducted an experimental program to determine the stress-strain relationship of 30 concrete samples reinforced with two distinct fibers (a hybrid of polyvinyl alcohol and steel fibers), with compressive strengths ranging from 40 to 120 MPa. A total of 80% of the experimental results were used to develop a new empirical stress-strain model, which was accomplished through the application of the parti
... Show More