Let G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
Stuck pipe is a prevalent and costly issue in drilling operations, with the potential to cost the petroleum industry billions of dollars annually. To reduce the likelihood of this issue, efforts have been made to identify the causes of stuck pipes. The main mechanisms that cause stuck pipes include drill cutting of the formation, inappropriate hole-cleaning, wellbore instability, and differential sticking forces, particularly in highly deviated wellbores. The significant consequences of a stuck pipe include an increase in well costs and Non-Productive Time (NPT), and in the worst-case scenario, the loss of a wellbore section and down-hole equipment, or the need to sidetrack, plug, or abandon the well. This paper provides a comprehensive
... Show MoreIn this paper, the effect size measures was discussed, which are useful in many estimation processes for direct effect and its relation with indirect and total effects. In addition, an algorithm to calculate the suggested measure of effect size was suggested that represent the ratio of direct effect to the effect of the estimated parameter using the Regression equation of the dependent variable on the mediator variable without using the independent variable in the model. Where this an algorithm clear the possibility to use this regression equation in Mediation Analysis, where usually used the Mediator and independent variable together when the dependent variable regresses on them. Also this an algorithm to show how effect of the
... Show MoreIn this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the stud
In this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the stud
Abstract
This study aimed to survey fungi associated with the product Indomie and Chips being the trades Iargely by a very important segment of society who are the children, beside consumed by adults, but less so, as the survey results to accompany some fungui samples sterile showed proportions presence included various fungi like. Aspergillus flavus, Aspergillus niger, Penicillium Spp., Fusarium graminearum, F.moniliforme, Alternaria alternate and Rhizopus Spp., and other fungi sterile are not diagnosed. The results showed large dominion fungi A. niger by presence sterile samples of both producers, followed by infection in Fusarium Spp., Penicillium Spp., and A. alternata by infection percentage 55, 20 and 17% respectively for the pr
The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More