Preferred Language
Articles
/
bsj-3481
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic Mechanism on Thermal Degradation of a Nitrate Ester Propellant
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Cutting of Fiber-Reinforced Plastics by a CW CO2 Laser
...Show More Authors

In this work, a CW CO2 laser was used for cutting samples of the fiber-reinforced
plastics (FRP) of three different types of reinforcing material; aramide, glass and carbon.
Cutting process was investigated throughout the variation of some parameters of cutting
process and their effects on cutting quality as well as the effect of an inert gas exist in the
interaction region and finally using a mechanical chopper in order to enhance the cutting
quality. Results obtained explained the possibility to perform laser cutting with high
quality in these materials by good control of the parameters and conditions of the process.

View Publication Preview PDF
Publication Date
Thu Jan 01 2026
Journal Name
Malaysian Journal Of Nursing
Pediatric Nursing Students and Artificial Intelligence: A Cross-Sectional Study
...Show More Authors

Background: The rapid integration of Artificial Intelligence (AI) into healthcare necessitates that nursing education evolves to equip students with essential technological competencies. Objectives: To explore pediatric nursing students' perceptions of AI in nursing and analyze associations with sociodemographic factors and prior AI knowledge. Methods: A descriptive cross-sectional study was conducted from December 2024 to March 2025 across five universities in Baghdad. A non-probability sample of 500 pediatric nursing students completed the Shinners Artificial Intelligence Perception (SAIP) tool. Data were analyzed using descriptive statistics and inferential comparisons (t-tests/ANOVA) via SPSS. Results: Participants had a mean ag

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 30 2025
Journal Name
بدبي اعمال وقائع المؤتمر الدولي الاول لعلوم المكتبات والمعلومات جامعة الوصل و مكتبة محمد بن راشد
Artificial Intelligence Skills of Information Institutions Workers: A Descriptive Study
...Show More Authors

Objectives: This research aims to study the artificial intelligence (AI) skills re-quired by employees in information institutions, specifically university libraries in Iraq, to enhance their services and align with modern technological advancements. It highlights the gap between the current knowledge of employees in Al technologies and their practical applications to improve the services of information institutions. Methodology: The research adopted a descriptive survey method, targeting em- ployees in three prestigious university libraries in Baghdad: the Central Library of the University of Baghdad, the Central Library and House of Books of Al-Mustansiriyah University, and the Central Library of the Iraqi University. A sample of (160)

... Show More
Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (48)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Dispersion in a Gas Filled Hollow Core Photonic Crystal Fiber
...Show More Authors

Hollow core photonic bandgap fibers provide a new geometry for the realization and enhancement of many nonlinear optical effects. Such fibers offer novel guidance and dispersion properties that provide an advantage over conventional fibers for various applications. Dispersion, which expresses the variation with wavelength of the guided-mode group velocity, is one of the most important properties of optical fibers. Photonic crystal fibers (PCFs) offer much larger flexibility than conventional fibers with respect to tailoring of the dispersion curve. This is partly due to the large refractive-index contrast available in the silica/air microstructures, and partly due to the possibility of making complex refractive-index structure over the fibe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
Educational Curricula of preeminent and Talent:Enrichment Curriculum as a Model
...Show More Authors

This research aimed at recognizing the properties of curricula that fitted to preeminent and talent students. Many types of these curricula were exposed, enrichment curriculum was explained as one of alternatives of available curricula.
The research used the analytical methodology for local and international literature in the field of preeminent and talent education to meet the properties of curricula that fitted to this special group of students. Many results was obtained as:
• This type of school enrichment curriculum consists of three levels( general discovery activities, individual and groups training activities, and individual or groups real problems).
• Investigation the effectively both sides of brain: right and left,

... Show More
View Publication Preview PDF