Preferred Language
Articles
/
bsj-5193
A complete (48, 4)-arc in the Projective Plane Over the Field of Order Seventeen
...Show More Authors

            The article describes a certain computation method of -arcs to construct the number of distinct -arcs in  for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each construction especially for large value of  and then reduce the running time of the calculation. Therefore, it allows to decrease the memory storage for the calculation processes. This method’s effectiveness evaluation is confirmed by the results of the calculation where a largest size of complete -arc is constructed.  This research’s calculation results develop the strategy of the computational approaches to investigate big sizes of arcs in  where it put more attention to the study of the number of the inequivalent classes of -secants of -arcs in  which is an interesting aspect. Consequently, it can be used to establish a large value of .

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Frustration degree and guilt among drug addicts harmful to themselves
...Show More Authors

This study aimed to identify the degree of frustration and guilt among addicts who hurt themselves with drug,  and to know the addicts perspective  who are in treatment clinics and rehabilitation centers  in Palestine, in order to achieve this goal aDeterminationThe study population has been identified , this study population consisted of ' (82) addict, the researcher used the descriptive analytical method which is appropriate for  this  study, so the researcher questioned the addicts who are in treatment clinics and rehabilitation centers  in Palestine and analyze their  responses  in light of some of the variables.

The study results showed that drug addicts who ar

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Sep 29 2025
Journal Name
Al–bahith Al–a'alami
Cultural and educational values for children
...Show More Authors

Programs directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Qualitative and Quantitative Estimation or Chemical Constituents from Leaves and Roots of Iraqi Agave Attenuata by GC-MS and RP-HPLC(Conference Paper) #
...Show More Authors

This research concentrate on cultivated Iraqi Agave attenuata dried leaves and roots, because of little studies on this plant especially on the root that lead to the eager of study and comparison of phytochemical constituents between leaves and root. Extraction of bioactive constituents was carried out using several solvents with increasing polarity (n-hexane, ethyl acetate and methanol) by soxhlet apparatus. Steroidal saponins in Agave genus is well documented in many species, lightening the minds in this research on extraction method which is specific for steroidal saponins. Phytochemical screening was done by GC/MS for n-hexane fraction, qualitative and quantitative estimation of several bioactive constituents (caffe

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Molecular Structure
Mixed-ligand complexes of ampicillin derived Schiff base ligand and Nicotinamide: Synthesis, physico-chemical studies, DFT calculation, antibacterial study and molecular docking analysis
...Show More Authors

A novel series of mixed-ligand complexes of the type, [ML1(L2)3]Clx [M= Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiff base (HL1) as main ligand, nicotinamide (L2) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR,1H-NMR,13C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiff base ligand, HL1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxygen atoms, whereas the sec

... Show More
View Publication
Scopus (34)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Energetic Parameters Study of Phenol Removal from Aqueous Solution by Electro-Fenton Advanced Oxidation Using Modified Electrodes with PbO2 and Graphene
...Show More Authors

The Electro-Fenton oxidation process is one of the essential advanced electrochemical oxidation processes used to treat Phenol and its derivatives in wastewater. The Electro-Fenton oxidation process was carried out at an ambient temperature at different current density (2, 4, 6, 8 mA/cm2) for up to 6 h. Sodium Sulfate at a concentration of 0.05M was used as a supporting electrolyte, and 0.4 mM of Ferrous ion concentration (Fe2+) was used as a catalyst. The electrolyte cell consists of graphite modified by an electrodepositing layer of PbO2 on its surface as anode and carbon fiber modified with Graphene as a cathode. The results indicated that Phenol concentration decreases with an increase in current dens

... Show More
View Publication Preview PDF
Crossref (11)
Crossref