Preferred Language
Articles
/
bsj-8569
Some New Results on Lucky Labeling
...Show More Authors

Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if  for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes while adding a graph G with Kn and deleting an edge e from Kn.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Science And Research
Effects of Pregabalin Drug on Level of Reproductive Hormones, Sexual Activity, Number and Weight of Offspring in Female Albino Rats
...Show More Authors

Abstract: This study was aimed to investigate the effect of two doses of pregabalin (PGB) on hormonal level and sexual activity in female albino rats. Ninety female rats with age (9-10 weeks) and weight (200±20 g) were divided into three major groups of thirty rats. First group was considered as control G1, the second G2 and third G3 groups were exposed to PGB into two doses 150, and 300 mg/kg body weight per day respectively. Each major group was divided into three subgroups (subgroup A, B, and C of each has ten rats), the treatments last for one month for subgroup A, two months for subgroup B, and three months for subgroup C. Five rats from each subgroup were placed separately into two breeding cages with two isolated males and wait

... Show More
Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Al-khwarizmi Engineering Journal
Surface Roughness Prediction for Steel 304 In Edm Using Response Graph Modeling
...Show More Authors

Electrical Discharge Machining (EDM) is a non-traditional cutting technique for metals removing which is relied upon the basic fact that negligible tool force is produced during the machining process. Also, electrical discharge machining is used in manufacturing very hard materials that are electrically conductive. Regarding the electrical discharge machining procedure, the most significant factor of the cutting parameter is the surface roughness (Ra). Conventional try and error method is time consuming as well as high cost. The purpose of the present research is to develop a mathematical model using response graph modeling (RGM). The impact of various parameters such as (current, pulsation on time and pulsation off time) are studied on

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
An Experimental Study on the Effect of Shape and Location of Vortex Generators Ahead of a Heat Exchanger
...Show More Authors

An experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .

In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.                     

The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Baghdad Science Journal
Synthesis, Characterization, Thermal Analysis Study and Antioxidant Activity for Some Metal Ions Cr (III), Fe (III), Mn (II) and Pd(II) Complexes with Azo Dye Derived from p-methyl-2-hydroxybenzaldehyde
...Show More Authors

ليكاند ازو جديد. 4-((3-formyl-2-hydroxyphenyl)diazenyl)-N-(5-methylisoxazol-3-yl)benzenesulfonamide, الليكاند المحضر استعمل لتحضير معقدات من ايونات معادن مختلفة مثل الكروم الثلاثي والمنغنيز الثنائي والحديد الثلاثي  والبلاديوم الثنائي بنسب مولية (1:1) ( ليكاند : فلز) نتائج التشخيص للمركبات يتقنيات مطيافية الاشعة فوق البنفسجية الاشعة تحت الحمراء الرنين النووي المغناطيسي البروتوني والكربوني وطيف الكتلة والتحليل الدقيق للعناصر ومحتوى الفلز وال

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
The Design and Simulation of a Novel Optical Adder Depending on Optical Tri-state Gates
...Show More Authors

Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 03 2018
Journal Name
Chinese Journal Of Physics
A true random number generator based on the photon arrival time registered in a coincidence window between two single-photon counting modules
...Show More Authors

True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules

View Publication
Scopus (22)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Tue Feb 01 2011
Journal Name
Iop Conference Series: Materials Science And Engineering
Contour extraction of echocardiographic images based on pre-processing
...Show More Authors

In this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Multifocus Images Fusion Based On Homogenity and Edges Measures
...Show More Authors

Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,

... Show More
View Publication Preview PDF
Crossref