In this paper we used Hosoya polynomial ofgroupgraphs Z1,...,Z26 after representing each group as graph and using Dihedral group to"encrypt the plain texts with the immersion property which provided Hosoya polynomial to immerse the cipher text in another"cipher text to become very"difficult to solve.
A new method based on the Touchard polynomials (TPs) was presented for the numerical solution of the linear Fredholm integro-differential equation (FIDE) of the first order and second kind with condition. The derivative and integration of the (TPs) were simply obtained. The convergence analysis of the presented method was given and the applicability was proved by some numerical examples. The results obtained in this method are compared with other known results.
Consider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs derived from the group and a few classes of zero-divisor graphs of the commutative ring R are examined.
The aim of this study was to investigate the disturbances of some liver enzymes like GPT and GOT level in different groups of women infected with toxoplasmosis. This study was performed on 600 apparently healthy women (pregnant, miscarriage and single) collected from different hospitals in Baghdad, AL-Yarmouk Teaching Hospital and Fatima AL-Zahra Hospital for Obstetric and children and Hay Hiteen clinic during November 2013 till April 2014. The detection of toxoplasmosis was done by a preliminary screening test LAT and the positive percentage was (29.55%), (30.36%) and (40.08%) for pregnant, miscarriage and single women respectively. While, the confirmation of positive results of LAT was done by ELISA-IgG and the results were (40%), (41.
... Show MoreThe strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomne
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreHere, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
The first step in this research is to find some of the necessary estimations in approximation by using certain algebraic polynomials, as well as we use certain specific points in approximation. There are many estimations that help to find the best approximation using algebraic polynomials and geometric polynomials. Throughout this research, we deal with some of these estimations to estimate the best approximation error using algebraic polynomials where the basic estimations in approximation are discussed and proven using algebraic polynomials that are discussed and proven using algebraic polynomials that are specified by the following points and if as well as if .
For the second step of the work, the estimatio
... Show MoreBackground: Asthma is an increasing worldwide health problem. The prevalence of asthma is higher in some ethnic minorities and lower in other ethnic groups. Environmental exposures, and psychosocial factors, have been suggested to be main mediators for asthma. Ethnicity related to racial background can influence the differences in asthma through the disease susceptible alleles.
Objective: To evaluates environmental and cultural risk factors for asthma among different ethnic groups.
Methods: Random sample of 337 Iraqi selected from 5,490 Iraqi residents’ in the Greater Detroit area. Validated questionnaire was used. Chi-square, t-test and logistic regression
... Show MoreThe ABO blood group system is highly polymorphic, with more than 20 distinct sub-groups; study findings are usually related to ABO phenotype, but rarely to the ABO genotype and animal models are unsatisfactory because their antigen glycosylation structure is different from humans. Both the ABO and Rh blood group systems have been associated with a number of diseases, but this is more likely related to the presence or absence of these tissue antigens throughout the body and not directly or primarily related to their presence on RBCs. A total of fifty-two 52 patients without complication of DMII, two hundred sixteen 216 patients with complication of DMII and seventy-one 71 person as healthy control were included in the study. The resu
... Show More