Let G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric
The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit
... Show MoreBackground: Radiopacity is one of the prerequisites for dental materials, especially for composite restorations. It's essential for easy detection of secondary dental caries as well as observation of the radiographic interface between the materials and tooth structure. The aim of this study to assess the difference in radiopacity of different resin composites using a digital x-ray system. Materials and methods: Ten specimens (6mm diameter and 1mm thickness) of three types of composite resins (Evetric, Estelite Sigma Quick,and G-aenial) were fabricated using Teflon mold. The radiopacity was assessed using dental radiography equipment in combination with a phosphor plate digital system and a grey scale value aluminum step wedge with thickness
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreThe study showed that there are (28) plant families present in Al-Razzaza Lake. The families are (Amaranthaceae, Amaryllidaceae, Aizoaceae, Apiaceae, Apocynaceae, Asteraceae, Brassicaceae, Boraginaceae, Capparaceae, Caryophyllaceae, Cistaceae, Colchicaceae, Convolvulaceae, Cynomoriaceae, Fabaceae, Frankeniaceae, Lamiaceae, Liliaceae, Malvaceae, Orobanchaceae, Plantaginaceae, Poaceae, Polygonaceae, Ranunculaceae, Solanaceae, Tamaricaceae,Typhaceae, Zygophyllaceae). Asteraceae family is the largest number of species found in abundance in this lake, followed by the Fabaceae family.
This study was conducted to make an inventory of the monocot plants that were collected before and now which stored in the herbarium of Iraq Natural History Museum for identifying them. The herbarium contains avery large and varied number of plants from different parts in Iraq and for different and varied environments. The plants collected, arranged and identified using taxonomic keys specific to these families. Currently, the plant samples are in the herbarium of Iraq Natural History Museum to be an important scientific reference for all researchers inside and outside the country. With the identification of botanical scientists for each family, gender and year in which it was first diagnosed.
This study aimed to make an inventory of leguminous plants for the purpose of identifying the plants that were collected over long periods and stored in the herbarium of Iraq Natural History Museum. It was found that the herbarium contains a large and varied number of plants from different parts of Iraq and in different and varied environments. It was collected and arranged according to a specific system in the herbarium to remain an important source for all graduate students and researchers to take advantage of these plants. Also, the flowering and fruiting periods of these plants in Iraq were recorded for different regions. Most of these plants begin to flower in the spring and thrive in fields and farms.
The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More