Preferred Language
Articles
/
bsj-3481
Variant Domination Types for a Complete h-ary Tree

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF HEAVY METALS POLLUTION INTYPES OF MILK SAMPLES IN BAGHDAD MARKETS: DETECTION OF HEAVY METALS POLLUTION INTYPES OF MILK SAMPLES IN BAGHDAD MARKETS

The levels of lead (pb), copper (cu), cobalt (co) and cadmium (cd) were determined in different kinds of milk and the health risks were evaluated. The mean levels were 0.73±0.21, 0.06±0.01, 0.12±0.01 and 0.14±0.01 ppm for these metals respectively. The levels of pb and cu were found to be insignificant differences (p<0.05), whereas the levels of co and cd, were no significant differences (p>0.05). The dry and liquid kinds of milk were different significantly (p<0.05), whereas the original, was no significant differences (p>0.05). The values for all metals were more than one. The metals pb and cd were detected at highest concentrations in most dry and liquid milk samples.

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Tue Jan 16 2018
Journal Name
Design And Manufacture An Automatic Knife For Date Palm Tree Frond Cutting Operates By Frequency Theory Cutting‏ Mra Abdulrazak A. Jasim‏
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Retrieving Mobile Phone Information Based on Digital Search Tree

     The current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genomics and Molecular Phylogenetics Tree Analysis of Actinopolyspora Iraqiensis

Actinopolyspora iraqiensis IQ-H1 is a novel strain of actinobacteria isolated from extremely halophilic soil samples in Iraq. The whole-genome sequence of this strain is deposited in the National Center for Biotechnology Information (NCBI) GenBank under the accession number NZ_AICW01000000. In this study, the genome features and the molecular phylogenetic tree of Act. iraqiensis IQ-H1are analyzed. The RAST tool was used for genome annotation. The genomic features were elucidated using QUAST tool. The circular genome map, and the core and pan-genome map of Act. iraqiensis IQ-H1 was generated using CGView and the GView tools respectively. The JSpeciesWS server was used for the tetranucleotide signature analysis a

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu May 02 2024
Journal Name
Petroleum And Coal
Scopus
View Publication
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimum err

... Show More
Scopus (4)
Crossref (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Bacterial Contamination of Acrylic Resin Complete Denture : In Vitro Study

Background: Cross contamination of dental appliances in the dental clinics and laboratories may potentially be a health hazard to the dental team and the patient. This study aimed to evaluate bacterial contamination of acrylic complete denture as received from dental laboratory before delivery to the patient, and then to evaluate the effectiveness of disinfection with 2% chlorhexidine and Kin denture cleaner tablet. Materials and methods: 45 newly made upper complete dentures undergone biaacterial examination for contamination before delivered to the patient. Samples were examined in two stages, first after finishing and polishing; when collected from the laboratory and before inserting to the patient mouth, second; after the samples were

... Show More
Crossref
View Publication Preview PDF