Let R be a commutative ring , the pseudo – von neuman regular graph of the ring R is define as a graph whose vertex set consists of all elements of R and any two distinct vertices a and b are adjacent if and only if , this graph denoted by P-VG(R) , in this work we got some new results a bout chromatic number of P-VG(R).
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIn this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
In this paper, a new class of sets, namely ï¡- semi-regular closed sets is introduced and studied for topological spaces. This class properly contains the class of semi-ï¡-closed sets and is property contained in the class of pre-semi-closed sets. Also, we introduce and study ï¡srcontinuity and ï¡sr-irresoleteness. We showed that ï¡sr-continuity falls strictly in between semi-ï¡- continuity and pre-semi-continuity.
In this paper, certain types of regularity of topological spaces have been highlighted, which fall within the study of generalizations of separation axioms. One of the important axioms of separation is what is called regularity, and the spaces that have this property are not few, and the most important of these spaces are Euclidean spaces. Therefore, limiting this important concept to topology is within a narrow framework, which necessitates the use of generalized open sets to obtain more good characteristics and preserve the properties achieved in general topology. Perhaps the reader will realize through the research that our generalization preserved most of the characteristics, the most important of which is the hereditary property. Two t
... Show MoreIt is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.
Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
Let be a commutative ring with identity, and be a unitary left -module. In this paper we introduce the concept pseudo weakly closed submodule as a generalization of -closed submodules, where a submodule of an -module is called a pseudo weakly closed submodule, if for all , there exists a -closed submodule of with is a submodule of such that . Several basic properties, examples and results of pseudo weakly closed submodules are given. Furthermore the behavior of pseudo weakly closed submodules in class of multiplication modules are studied. On the other hand modules with chain conditions on pseudo weakly closed submodules are established. Also, the relationships of pseudo weakly closed
... Show MoreDie Forschung besteht aus zwei Kapiteln: das erste Kapitel geht es nur um die Form des Gedichts, aber das zweite Kapitel geht es um die Analyse des Gedichts, und das ist das Wesen der Arbeit, gleichzeitig enthält das zweite Kapitel auch zwei wichtige Disziplinen.
Die erste Disziplin handelt es sich um die Struktur des Gedichts, nämlich die lyrische Seite; Reim,Rhythmus,Strophe,und Versmaße, aber die zweite Disziplin handelt es sich um den Inhalt, erklärt hier sowohl das Wesen als auch das Ziel des Gedichts, denn das Gedicht besteht aus vier Strophen, die miteinander zu sehr nicht getrennt sind.
Der Dichter beschreibt in erster Strophe die Beziehung zwischen einem Paar, das genau acht Jahre zusammen gelebt hat. Die bei
... Show More