Preferred Language
Articles
/
bsj-6996
Some K-Banhatti Polynomials of First Dominating David Derived Networks
...Show More Authors

Chemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 27 2014
Journal Name
Soft Computing
Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks
...Show More Authors

View Publication
Scopus (30)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Parallel Particle Swarm Optimization Algorithm for Identifying Complex Communities in Biological Networks
...Show More Authors

    Identification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Applied Soft Computing
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks
...Show More Authors

Scopus (246)
Crossref (202)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Data Aggregation in Wireless Sensor Networks Using Modified Voronoi Fuzzy Clustering Algorithm
...Show More Authors

Data centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computational Intelligence Systems
Evolutionary Feature Optimization for Plant Leaf Disease Detection by Deep Neural Networks
...Show More Authors

View Publication
Scopus (55)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Sun Jun 23 2019
Journal Name
Journal Of The College Of Basic Education
Viscometric and Activation energy study of PEG 6000 in water, and solution of DMSO with water at 298.15 k, 308.15, 318.‏
...Show More Authors

Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Dec 18 2022
Journal Name
Journal Of The College Of Basic Education
A (k,ℓ) Span in Three Dimensional Projective Space PG(3,p) Over Galois Field where p=4
...Show More Authors

الغرض من هذا العمل هو دراسة الفضاء الإسقاطي ثلاثي الأبعاد PG (3، P) حيث p = 4 باستخدام المعادلات الجبرية وجدنا النقاط والخطوط والمستويات وفي هذا الفضاء نبني (k، ℓ) -span وهي مجموعة من خطوط k لا يتقاطع اثنان منها. نثبت أن الحد الأقصى للكمال (k، ℓ) -span في PG (3،4) هو (17، ℓ) -span ، وهو ما يساوي جميع نقاط المساحة التي تسمى السبريد.

View Publication
Crossref (1)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Measure the Impact of global financial crisis on some indicators of the Saudi Arabia's economy using the Mendel-Fleming model for period (1997-2015)
...Show More Authors

         The main objective of this study is to measure the Impact of global financial crisis on some indicators of the Saudi Arabia's economy using the Mendel-Fleming model, the importance of the study applied by focusing on the theme of general equilibrium in the face of fluctuations in the global economy. Study used a descriptive approach and the methodology of econometrics to construct the model. Study used Eviews Program for data analysis. The Data was collected from the Saudi Arabian Monetary Agency, for the period (1997-2014).Stationery of the variables was checked by Augmented Dickey-Fuller (ADF) and Phillips Perron (PP) unit roots tests. And also the co-integration

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Study Some Parameters of HCV Isolated From Sample of Hemophilic Patients in Children Welfare Teaching Hospitalin Medical City/Baghdad
...Show More Authors

Objective(s) : This study aimed at evaluating the seroprevalence of anti -HCV and studying the
correlation between hemophilia and risk factors for acquiring HCV such as age , marital status &
occupation among hemophilic patients .
Methodology : 210 hemophilic patients in children welfare teaching hospital/medical city/Baghdad–Iraq
(hemophilia center) were investigated using prepared questionnaire and tested for HCV infection, those
were measuring patient’s age, hemophilia types and severity, marital status, residency and history of
previous HCV infection .
Results : Most hemophilic patients were hemophilia A at severe , hemophilia was at age group 20 – 29
years , the majority of patients were unmarried a

... Show More
View Publication Preview PDF