Preferred Language
Articles
/
aBa3i4cBVTCNdQwCBVVo
Closure Operators on Graphs
...Show More Authors

The aim of this paper is to generate topological structure on the power set of vertices of digraphs using new definition which is Gm-closure operator on out-linked of digraphs. Properties of this topological structure are studied and several examples are given. Also we give some new generalizations of some definitions in digraphs to the some known definitions in topology which are Ropen subgraph, α-open subgraph, pre-open subgraph, and β-open subgraph. Furthermore, we define and study the accuracy of these new generalizations on subgraps and paths.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2012
Journal Name
Journal Of Engineering
Prediction of Smear Effect on the Bearing Capacity of Driven Piles
...Show More Authors

This paper deals with prediction the effect of soil re-moulding (smear) on the ultimate bearing capacity of driven piles. The proposed method based on detecting the decrease in ultimate bearing capacity of the pile shaft (excluding the share of pile tip) after sliding downward. This was done via conducting an experimental study on three installed R.C piles in a sandy clayey silt soil. The piles were installed so that a gap space is left between its tip and the base of borehole. The piles were tested for ultimate bearing capacity according to ASTM D1143 in three stages. Between each two stages the pile was jacked inside the borehole until a sliding of about 200mm is achieved to simulate the soil re-moulding due to actual pile driving. The re

... Show More
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Negative Reflections of Ottomans and Persian struyy on Iraq (1508 – 1914)
...Show More Authors

Continuous conflict between Parisian and Ottoman states the results that Iraq became as
aground for their battles which leads to their own interests in Iraq which are shape their
strategy. The conflict continues for long time. In spite of, they signed many treatments and
protocols between the two sides, as Arzarom treaty , the first and the second, Tahran protocols
, and Astana protocol. This conflict, no sides of them to dose any part of their land, but these
treaties leaded to a big loss to Iraq ,which lost parts of it's land and water area in Ahwaz and
shatt AL-Arab, so, Iraq became as a smoth target for their interests, and lost its
sovereignty,and lost self-govern of the country country . so the research conclud

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Annals Of Fuzzy Mathematics And Informatics
Topology of cubic bipolar structures and its application on Q-algebra
...Show More Authors

In this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.

Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
study the effects of the polluted waste water on the environment
...Show More Authors

to study the discribrion and the pollution in the environment in the south of baghdad samples of waste water from industrail units using the mercury in its process also

View Publication Preview PDF
Publication Date
Wed Oct 08 2025
Journal Name
Hammurabi Journal For Studies
(The impact of legislative drafting on the achievement of electoral justice)
...Show More Authors

View Publication
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Doppler Phenomenon on the Speed of Blood Flow
...Show More Authors

This research studying the phenomenon of Doppler (frequency Doppler) as a method through which the direction and speed of the blood cells flows in blood vessels wear measured. This Doppler frequency is relied upon in medicine for measuring the speed of blood flow, because the blood flow is an important concept from the concepts of medicine. It represents the function and efficient of the heart and blood vessels in the body so any defect in this function will appear as a change in the speed of blood flow from the normal value assumed. As this speed changes alot in cases of  disease and morbidity  of the heart, so in order to identify the effect of changing the Doppler frequency on the speed of blood flow and the relationship of

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Review on Heat Transfer Process Inside Open and Closed Porous Cavity
...Show More Authors

Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 17 2020
Journal Name
International Journal Of Applied Mechanics And Engineering
Analysis of Structural Concrete Bar Members Based on Secant Stiffness Methods
...Show More Authors
Abstract<p>In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A compari</p> ... Show More
View Publication
Scopus Crossref