Consider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs derived from the group and a few classes of zero-divisor graphs of the commutative ring R are examined.
A laboratory experiment has been carried out in the College of Science-University of Salahaddin to study the effect of different levels (0,5,10 and 15%) and sizes(250 and 1000µm) of walnut seeds residues and (160mg.kg-1) phosphorus fertilization on the concentration of phosphorus availability and alkaline phosphatase activity in calcareous soil during 15 and 30 days period of incubation, the experimental design in factorial complet randomize design (C.R.D) with three replications. The results indicated that the application of different levels of walnut seed residues decreases the concentration of phosphorus availability and alkaline phosphatase activity, however the results revealed that combination between levels and sizes o
... Show MoreObjective: determine the effectiveness of an education program on youth's level of awareness towards
household waste control.
Methodology: A Quazi-experimental study was conducted. Non-probability (quota sample) of (80) young
persons is selected from Baghdad Governorate. They are divided into two equal groups of (40) subjects for the
study group which is exposed to the household waste control educational program. The remaining is the
control group which is not exposed to the educational program.
Results: The findings of the study indicated that youth of the study group have got benefits from the
implementation of the educational program towards household waste control and change has occurred to
their awareness tow
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This work aimed to investigate the effect of Diode laser 805 nm on plasmid DNA and RNA
contents of some Gram negative bacteria represented by Escherichia coli and Proteus mirabilis isolates
.Plasmid extraction was done using two methods (Salting out and CTAB method).Different powers and
pulse repetition rates for 805 nm Diode Laser were used to study this effect. Results revealed that the
plasmid profile of the two species were highly affected using (2, 3) W at different frequencies including
5and 10 kHz as compared with 1 kHz while plasmids were gradually disappeared at 1W, 10 kHz. In the
same time the shining of RNA was also decreased gradually then disappeared with increasing powers
especially at 2W and 10 kHz cau
The objective of this research is to measure the training programs and identify the nature and then measure how it reflected on the quality of municipal services provided by the municipal departments investigated by measuring the quality of services based on quality standards, the researcher chose four municipal departments in the Rusafa / Baghdad (164 people) representing the directors and their assistants, officials of the municipal departments, the people and the engineering staff in charge of the task forces as well, including the survey of the views of the concerned persons in the management of the Vocational Training Institute in the Secretariat of the Republic, The quality of the municipal services
... Show MoreNew nitrone and selenonitrone compounds were synthesized. The condensation method between N-(2-hydroxyethyl) hydroxylamine and substituted carbonyl compounds such as [benzil, 4, 4́-dichlorobenzil and 2,2́ -dinitrobenzil] afforded a variety of new nitrone compounds while the condensation between N-benzylhydroxylamine and substituted selenocarbonyl compounds such as [di(4-fluorobenzoyl) diselenide and (4-chlorobenzoyl selenonitrile] obtained selenonitrone compounds. The condensation of N-4-chlorophenylhydroxylamine with dibenzoyl diselenide obtained another type of selenonitrone compounds. The structures of the synthesized compounds were assigned based on spectroscopic data (FT-IR,
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show Moreالخلاصة
تتناول هذه الورقة مخططات وسياسات الاستيطان في الضفة الغربية والقدس الشرقية منذ العام 1967، عبر سياسات قادها حزب العمل وأكملها حزب الليكود وكاديما وبقية الأحزاب الإسرائيلية، تلك السياسات التي استهدفت فرض السيطرة السياسية الكاملة على الأرض، وما نتج عن ذلك من سيطرة حصرية على الأرضوتقييد استخداماتها، ومحاصرة الوجود الفلسطيني والتضييق عليه، وتحويل مراكز ال
... Show MoreA modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va
... Show MoreThe adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show More