Preferred Language
Articles
/
5RZ3mYcBVTCNdQwCc1dl
Generalization of Rough Set Theory Using a Finite Number of a Finite d. g.'s
...Show More Authors

This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Further Results on (a, d) -total Edge Irregularity Strength of Graphs
...Show More Authors

Consider a simple graph   on vertices and edges together with a total  labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say  defined by  for all  where  Also, the value  is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by  and is the least  for which G admits   edge irregular h-labeling.  In this article,   for some common graph families are examined. In addition, an open problem is solved affirmatively.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Synthesis of heterostructure composite (g-C3N4/phosphomolybdic acid) for synergistic piezo/photo-catalytic degradation of CR dye and S. aureus bacteria
...Show More Authors

View Publication
Scopus (23)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Ideals of the full transformation semigroup of a free left G-act on n-generators
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Experimental and finite element analysis of mechanical behavior of concrete damaged by Alkali Aggregate Reaction (AAR) and repaired with CFRP Layers
...Show More Authors
Abstract<p>Concrete structures is affected by a deleterious reaction, which is known as Alkali Aggregate Reaction (AAR). AAR can be defined as a chemical reaction between the alkali content in the pore water solution of the cement paste and reactive forms of silica hold in the aggregate. This internal reaction produces expansion and cracking in concrete, which can lead to loss of strength and stiffness. Carbon fiber-reinforced polymer (CFRP) is one of the methods used to suppress further AAR expansion and rehabilitate and support damaged concrete structures. In this research, thirty-six cylindrical specimens were fabricated from non-reactive and reactive concrete, which contained fused silica as</p> ... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Study the electronic and spectroscopic properties of ALxB7-XN7 Wurtzoids as a function of size and concentration using density functional theory
...Show More Authors

Electronic properties including (bond length, energy gap, HOMO, LUMO and density of state) as well as spectroscopic properties such like infrared, Raman scattering, force constant, reduced mass and longitu- dinal optical mode as a function of frequency are based on size and concentration of the molecular and nanostructures of aluminum nitride ALN, boron nitride BN and AlxB7-XN7 as nanotubes has calculated using Ab –initio approximation method dependent on density functional theory and generalized gradient approximation. The geometrical structure are calculated by using Gauss view 05 as a complementary program. Shows the energy gap of ALN, BN and AlxB7-XN7 as a function of the total number of atoms , start from smallest molecule to reached

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Generating pairwise combinatorial test set using artificial parameters and values
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Aug 03 2025
Journal Name
Journal Of Molecular Structure
Synergistic design of carbazole-bearing (D–π)₂-D–π–A architectures for dye-sensitized solar cells: Experimental and theoretical evaluations
...Show More Authors

Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
Specifying Quality of a Tight Oil Reservoir through 3-D Reservoir Modeling
...Show More Authors

Increasing hydrocarbon recovery from tight reservoirs is an essential goal of oil industry in the recent years. Building real dynamic simulation models and selecting and designing suitable development strategies for such reservoirs need basically to construct accurate structural static model construction. The uncertainties in building 3-D reservoir models are a real challenge for such micro to nano pore scale structure. Based on data from 24 wells distributed throughout the Sadi tight formation. An application of building a 3-D static model for a tight limestone oil reservoir in Iraq is presented in this study. The most common uncertainties confronted while building the model were illustrated. Such as accurate estimations of cut-off permeab

... Show More