The aim of this paper is to generate topological structure on the power set of vertices of digraphs using new definition which is Gm-closure operator on out-linked of digraphs. Properties of this topological structure are studied and several examples are given. Also we give some new generalizations of some definitions in digraphs to the some known definitions in topology which are Ropen subgraph, α-open subgraph, pre-open subgraph, and β-open subgraph. Furthermore, we define and study the accuracy of these new generalizations on subgraps and paths.
One hundred and eighty five urine samples were collected eight isolates (4.3%) were obtained and diagnosed as Staphylococcus aureus. Among 8 isolates, 5 (62.5%) S. aureus isolates were found to be enterotoxigenic, most of isolates produced at least two types of Staphylococcal enterotoxins (SEs). The production of enterotoxins in the presence or absence of Thymol extracts (aqueous and alcoholic) were estimated using a reversed passive latex agglutination (SET-RPLA) kit. The extracts reduced enterotoxin production compared with the control. Enterotoxin inhibition was observed for enterotoxin C production at minimal inhibitory concentrations (MIC) at 400 µg/ml, whereas production of enterotoxins A, B, and
... Show MoreThe effect of the tensor term in the Skyrme interaction has been estimated in calculating the static and dynamic nuclear properties in sd and fp-shell model spaces nuclei. The nuclear shell gaps have been studied with different Skyrme parameterizations; Skxta and Skxtb with tensor interaction, SkX, SkM, and SLy4 without tensor interaction, and Skxcsb with consideration of the effect of charge symmetry breaking. We have examined the stability of N = 28 for 42Si and 48Ca. The results showed that the disappearance of the magicity occurs in the shell closure of 42Si. Furthermore, excitation energy, quadrupole deformation, neutron separation energy, pairing energy, and density profile have also been calculated. Quadrupole deformation indicates a
... Show MoreIn Australia, most of the existing buildings were designed before the release of the Australian standard for earthquake actions in 2007. Therefore, many existing buildings in Australia lack adequate seismic design, and their seismic performance must be assessed. The recent earthquake that struck Mansfield, Victoria near Melbourne elevated the need to produce fragility curves for existing reinforced concrete (RC) buildings in Australia. Fragility curves are frequently utilized to assess buildings’ seismic performance and it is defined as the demand probability surpassing capacity at a given intensity level. Numerous factors can influence the results of the fragility assessment of RC buildings. Among the most important factors that can affe
... Show MoreThis article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MoreThe research aims to release the concept of auditing reporting and its role in the rationalization of economic decisions in the companies listed in the Iraq Stock Exchange from the viewpoint of academics, professionals, investors and lenders. Auditor reporting witnessed the great progress in many areas addressed many of the previous studies compare with Iraqi auditors reporting because there are some defects in these aria .The research problem focused whether the auditor report in Iraq is contains useful information to rationalize investment decisions & lending decisions in the shareholding companies listed on the Iraq Stock Exchange , and under that premise , " There is statistically significant relationship between the reporting au
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More