Preferred Language
Articles
/
bsj-3481
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
A Posteriori L_∞ (L_2 )+L_2 (H^1 )–Error Bounds in Discontinuous Galerkin Methods For Semidiscrete Semilinear Parabolic Interface Problems
...Show More Authors

The aim of this paper is to derive a posteriori error estimates for semilinear parabolic interface problems. More specifically, optimal order a posteriori error analysis in the - norm for semidiscrete semilinear parabolic interface problems is derived by using elliptic reconstruction technique introduced by Makridakis and Nochetto in (2003). A key idea for this technique is the use of error estimators derived for elliptic interface problems to obtain parabolic estimators that are of optimal order in space and time.

View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Modified Support Vector Machine Classifiers Using Stochastic Gradient Descent with Application to Leukemia Cancer Type Dataset
...Show More Authors

Support vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Mar 21 2024
Journal Name
Egyptian Journal Of Medical Human Genetics
Low heterozygosity for rs3811050, a 5 prime untranslated region variant of the gene encoding interleukin-38 (IL1F10), is associated with a reduced risk of systemic lupus erythematosus
...Show More Authors
Abstract<sec> <title>Background

Interleukin-38 (IL-38), an inflammatory cytokine discovered in recent years, has been implicated in the pathogenesis of systemic lupus erythematosus (SLE). IL-38 is encoded by the IL1F10 (interleukin 1 family member 10) gene. Genetic variants of this gene have been associated with susceptibility to a number of autoimmune and inflammatory diseases, while their association with SLE risk has not been explored. In this case–control study, two novel variants of the 5 prime untranslated region (5′UTR) of the IL1F10 gene, rs3811050 C/T and rs3811051 T/G, were investigated

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simulation Expirment for Proofing the Theoretical Assumption of Time Complexity for Binary Search Tree
...Show More Authors

      It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree).  This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method  to prove th

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Dynamic Response of a Nonlinear Fabry-Perot Etalon for Various Medium Response Times
...Show More Authors

     In this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Electron lens Optimization for Beam Physics Research using the Integrated Optics Test Accelerator
...Show More Authors

This study proposed control system that has been presented to control the electron lens resistance in order to obtain a stabilized electron lens power. This study will layout the fundamental challenges, hypothetical plan arrangements and development condition for the Integrable Optics Test Accelerator (IOTA) in progress at Fermilab. Thus, an effective automatic gain  control (AGC) unit has been introduced which prevents fluctuations in the internal resistance of the electronic lens caused by environmental influences to affect the system's current and power values ​​and keep them in stable amounts. Utilizing this unit has obtained level balanced out system un impacted with electronic lens surrounding natural varieties.

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Design and construction of anair pollution detection system using a laser beam and absorption spectroscopy
...Show More Authors

Air pollution is one of the important problems facing Iraq. Air pollution is the result of uncontrolled emissions from factories, car exhaust electric generators, and oil refineries and often reaches unacceptable limits by international standards. These pollutants can greatly affect human health and regular population activities. For this reason, there is an urgent need for effective devices to monitor the molecular concentration of air pollutants in cities and urban areas. In this research, an optical system has been built consisting of aHelium-Neonlaser,5mWand at 632.8 nm, a glass cell with a defined size, and a power meter(Gentec-E-model: uno) where a scattering of the laser beam occurs due to air pollution. Two pollutants were examin

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Existence of Fixed Points for Expansive Mappings in Complete Strong Altering JS-metric space
...Show More Authors

The paper aims at initiating and exploring the concept of extended metric known as the Strong Altering JS-metric, a stronger version of the Altering JS-metric. The interrelation of Strong Altering JS-metric with the b-metric and dislocated metric has been analyzed and some examples have been provided. Certain theorems on fixed points for expansive self-mappings in the setting of complete Strong Altering JS-metric space have also been discussed.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Try to combine more than approaches and competitive strategies to achieve a sustainable competitive advantage.
...Show More Authors

The objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination". 

View Publication Preview PDF
Crossref (1)
Crossref