Preferred Language
Articles
/
bsj-8408
Quotient Energy of Zero Divisor Graphs And Identity Graphs
...Show More Authors

Consider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph  make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs  of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs  derived from the group  and a few classes of zero-divisor graphs  of the commutative ring R are examined.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
The Impact of Legislative Factor in the Identity of Modern Residential Urban in Iraq
...Show More Authors

 The Urban Residential has developed and changed in different periods of time with successive and gradual shifts, as it cast a shadow over the characterization of modern urbanism in Iraq. The semi-total absence of the governing legislation of urbanization as well as the weakness of the State's role of supervisory in addition to neglecting urban heritage contributed in offering a strange environment  in relation to its traditional identity.  That was increased by the pressure of the using urban environment as a result of the increasing of population as well as the growth of people’s needs. The research aims to provide an objective view for a mechanism of the application of urban legislation to monitor the implementation o

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 18 2014
Journal Name
Desalination And Water Treatment
Removal of zinc from contaminated groundwater by zero-valent iron permeable reactive barrier
...Show More Authors

Scopus (22)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Feb 24 2015
Journal Name
Robotica
Multi-level control of zero-moment point-based humanoid biped robots: a review
...Show More Authors
SUMMARY<p>Researchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped </p> ... Show More
View Publication
Scopus (46)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Single-Phase Grid-Tied Transformerless Inverter of Zero Leakage Current for PV System
...Show More Authors

View Publication
Scopus (55)
Crossref (50)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Anonymous Identity of Forced Migrants: A Post-Colonial Study
...Show More Authors

Colonialism invades the Third World countries, physically and psychologically. This article exposes but sample of the physical and psychological consequences of colonialism. The Beekeeper of Aleppo (2019) by the British novelist, Christy Lefteri is a typical novel to diagnose the harsh circumstances of individuals within and after the disaster. Since it depicts characters from Asian countries, it would be a best representative for all Asian people who suffer colonialism. Migration toward anonymity is the mere option for the colonized people. Aftermath, they experience displacement, trauma, and the loss of identity.

View Publication
Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Dialectic of Identity and the Other in Iraqi Contemporary Theatre: انس راهي علي
...Show More Authors

  The value of culture in its interaction is composed and formulated according to compatible and incompatible roles which view the identity that adopts that formation although it is in most cases perceived and declared. The attraction and difference characteristic might be implied within subjective and procedural meaning through which it seeks to make the identity mobile subject to identity- shaping cultural causes implying the conflicts that take the shape and culture of real time. As for the end of the twentieth century and afterward where the concepts of hegemony, globalization, cultural invasion, colonial and imperial culture, all these causes made the cultural identity concept appear on the surface of the critical studies as a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 28 2025
Journal Name
مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا
From Algorithms to Applications: A Review of AI-Based Face Recognition and Identity Verification
...Show More Authors

Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni

... Show More
View Publication
Crossref
Publication Date
Sat Nov 01 2025
Journal Name
Journal Of Language Teaching And Research
Identity Crisis in Diana Abu-Jaber’s Origin: A Pragma-Stylistic Study
...Show More Authors

Identity crisis is a dominant literary theme, especially in most Arab women writers’ works. However, it has not been given enough attention from a linguistic point of view. By so doing, the current study intends to fill this gap by analyzing the identity crisis from a pragma-stylistic perspective by examining the writer's style in three purposely selected extracts from Diana Abu-Jaber’s novel Origin (2007). The study aims to examine the identity crisis by using pragmatic and stylistic tools and to explore the effects of Abu-Jaber’s stylistic choices on the readers of her work. To conduct this study, an eclectic model comprising Searle’s speech acts (1979), Brown and Levinson's politeness theory (1987), Leech's model of figur

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Solving the Hotdog Problem by Using the Joint Zero-order Finite Hankel - Elzaki Transform
...Show More Authors

This paper is concerned with combining two different transforms to present a new joint transform FHET and its inverse transform IFHET. Also, the most important property of FHET was concluded and proved, which is called the finite Hankel – Elzaki transforms of the Bessel differential operator property, this property was discussed for two different boundary conditions, Dirichlet and Robin. Where the importance of this property is shown by solving axisymmetric partial differential equations and transitioning to an algebraic equation directly. Also, the joint Finite Hankel-Elzaki transform method was applied in solving a mathematical-physical problem, which is the Hotdog Problem. A steady state which does not depend on time was discussed f

... Show More
View Publication Preview PDF
Scopus Crossref