Preferred Language
Articles
/
LRY_locBVTCNdQwC_Ffb
Supra-Approximation Spaces Using Mixed Degree System in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.

Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Reading Comprehension: Theory and Application
...Show More Authors

This study aims at discussing the theoretical and applicable parts of the reading comprehension to help the teachers of Arabic. This study shows that the students have a general weakness in reading comprehension. The researcher handles issues related to reading comprehension and to practicing exercises of the training strategies such as: dialogue, discussion, discussion questions, continuous training, group works. Such skills will be used to analyze a poem to see the level of the students’ reading comprehension and to develop the students’ skills. The study answers two questions:
1- What is the reading comprehension from a theoretical perspective?
2- How can we develop the skills of the reading comprehension from the practical

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation of Cathodic Protection System Using Matlab
...Show More Authors

Iraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Secure Seaport Management System using Blockchain Technology
...Show More Authors

Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Using Fuzzy Games Theory to Determine the optimal Strategy for The Mobile Phone Networks in The Baghdad And Basra governorates
...Show More Authors

      The objective of this research is employ the special cases of  function  trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of  Baghdad and Basra, has been the adoption of different periods of the  functions belonging to see the change happening in the matrix matches and the impact  that the strategies  and decision-making  available to each player and the impact on  societ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On S*g--Open Sets In Topological Spaces
...Show More Authors

  In this paper, we introduce a new class of sets, namely , s*g--open sets and we show that the family of all s*g--open subsets of a topological space ) ,X(  from a topology on X which is finer than  . Also , we study the characterizations and basic properties of s*g-open sets and s*g--closed sets . Moreover, we use these sets to define and study a new class of functions, namely , s*g-  -continuous functions and s*g-  -irresolute functions in topological spaces . Some properties of these functions have been studied .

View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Neutrosophic Simply b-Open Set in Neutrosophic Topological Spaces
...Show More Authors

In this paper, we procure the notions of neutrosophic simply b-open set, neutrosophic simply b-open cover, and neutrosophic simply b-compactness via neutrosophic topological spaces. Then, we establish some remarks, propositions, and theorems on neutrosophic simply

b-compactness. Further, we furnish some counter examples where the result fails.

View Publication Preview PDF
Scopus (20)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent & Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On Soft bc-Open Sets in Soft Topological Spaces
...Show More Authors

In this paper, we offer and study a novel type generalized soft-open sets in topological spaces, named soft Æ„c-open sets. Relationships of this set with other types of generalized soft-open sets are discussed, definitions of soft Æ„ , soft bc- closure and soft bc- interior are introduced, and its properties are investigated. Also, we introduce and explore several characterizations and properties of this type of sets.

View Publication Preview PDF
Scopus (9)
Scopus Crossref