Let G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
Abstract
A series of new 4(3H)-quinazolinone derivatives (S1-S4) were synthesized and characterized by FTIR,1HNMR and 13CNMR .Their cytotoxic activity against a set of human cancer cell lines MCF-7 (breast) and A549 (lung) was evaluated using MTT assay. To detect their selectivity toward cancer cells, the compounds were also tested against epithelial cells derived from normal human fibroblast (NHF). Methotrexate (MTX) was used as a reference for comparison . All the tested compounds exhibited toxicity against the normal cells lower than cancer cells. All the tested compounds displayed higher cytotoxicity against lung cancer cell line (A549) than MTX with the most
... Show MoreThis new azo dye 7-(3-hydroxy-phenylazo)-quinoline-8-ol was subsequently used to prepare a series of complexes with the chlorides of Fe, Co, Zn, Ru, Rh and Cd. The compounds identified by 1H and 13C-NMR, FT-IR, UV-Vis, mass spectroscopy, as well as TGA, DSC, and C.H.N., conductivity, magnetic susceptibility, metal and chlorine content. The results showed that the ligand behaves in a trigonal behavior, and that the complexes gave tetrahedral, except for Fe, Ru and Rh octahedral was given, that all of them are non-electrolytes. The effectiveness of both the compounds in inhibiting free radicals was evaluated by the ability to act as an antioxidant was measured using DPPH as a free radical and gallic acid as a standard substance, the
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis paper compare the accurecy of HF propagation prediction programs for HF circuits links between Iraq and different points world wide during August 2018 when solar cycle 24 (start 2009 end 2020) is at minimun activity and also find out the best communication mode used. The prediction programs like Voice of America Coverage Analysis Program (VOACAP) and ITU Recommendation RS 533 (REC533 ) had been used to generat HF circuit link parameters like Maximum Usable Frequency ( MUF) and Frequency of Transsmision (FOT) .Depending on the predicted parameters (data) , real radio contacts had been done using a radio transceiver from Icom model IC 7100 with 100W RF
... Show MorePrediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bay
... Show MoreThe aim of this work is to evaluate some mechanical and physical
properties (i.e. the impact strength, hardness, flexural strength,
thermal conductivity and diffusion coefficient) of
(epoxy/polyurethane) blend reinforced with nano silica powder (2%
wt.). Hand lay-up technique was used to manufacture the composite
and a magnetic stirrer for blending the components. Results showed
that water had affected the bending flexural strength and hardness,
while impact strength increased and thermal conductivity decreased.
In addition to the above mentioned tests, the diffusion coefficient
was calculated using Fick’s 2nd law.
This research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha
... Show More