Preferred Language
Articles
/
bsj-5193
A complete (48, 4)-arc in the Projective Plane Over the Field of Order Seventeen
...Show More Authors

            The article describes a certain computation method of -arcs to construct the number of distinct -arcs in  for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each construction especially for large value of  and then reduce the running time of the calculation. Therefore, it allows to decrease the memory storage for the calculation processes. This method’s effectiveness evaluation is confirmed by the results of the calculation where a largest size of complete -arc is constructed.  This research’s calculation results develop the strategy of the computational approaches to investigate big sizes of arcs in  where it put more attention to the study of the number of the inequivalent classes of -secants of -arcs in  which is an interesting aspect. Consequently, it can be used to establish a large value of .

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 06 2014
Journal Name
Journal Of Educational And Psychological Researches
Self-determintion and Emotional Experience and their Relationship with achievement striving for the college Students
...Show More Authors

Human beings have an innate and natural aim to achieve their self-interests and to show their ability to overcome challenges in a better way, therefore the move towards self determination is expressed by intrinsic motivation. The desire of absorbing in this task is to enjoy the task in it self and benefitting from it such a motivation is the desire rooted in human nature to judge and choose in which individual is conscious in his self, abilities and adequacy that help him in control the different  situations of life passed by him. His choices and actions are voluntary  and non-restricted to intervention or external control because control is inner and subjective, while his behavior is self-regulated with the feeling of

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluating the disclosure level due to Standards & Poor’s (S&P) Indicators And its effect on relevant accounting information An applied research in Baghdad bank
...Show More Authors

The world and the business environment are constantly witnessing many economic changes that have led to the expansion of the business' volume due to mergers and the increase in an investments volume and the complexity of business and the transformation of some systems, which was reflected on the size of the risk and uncertainty which led to necessity of a presence of transparent and objective accounting information In the way that reflects the financial performance of the economic units to be available to all users of that information, therefore, The need for the existence of indicators for transparency in the disclosure of accounting information that these units adhere to. Standards & Poor's indicators, which included items

... Show More
View Publication Preview PDF
Publication Date
Wed May 26 2021
Journal Name
Pharmaceuticals
Pt(II)-Thiocarbohydrazone Complex as Cytotoxic Agent and Apoptosis Inducer in Caov-3 and HT-29 Cells through the P53 and Caspase-8 Pathways
...Show More Authors

In this study, a platinum(II) complex ([Pt(H2L)(PPh3)] complex) containing a thiocarbohydrazone as the ligand was tested as an anti-proliferative agent against ovarian adenocarcinoma (Caov-3) and human colorectal adenocarcinoma (HT-29) through MTT assays. Apoptotic markers were tested by the AO/PI double staining assay and DNA fragmentation test. Flow cytometry was conducted to measure cell cycle distribution, while the p53 and caspase-8 pathways were tested via immunofluorescence assay. Results demonstrated that the cytotoxic effect of the Pt(II)- thiocarbohydrazone complexes against Caov-3 and HT-29 cells was highly significant, and this effect triggered the activation of the p53 and caspase-8 pathways. Besides, apoptosis stimulated by th

... Show More
Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Adolescents' Quality of life in Hilla City
...Show More Authors

Objective(s): The present study describes the quality of life (QOL) among adolescents with age of (12-22) year old and identifies factors that may be associated with it. Methodology: A cross-sectional design is carried throughout to evaluate adolescents' quality of life in Hilla City for the period of September 2nd 2016 to November 6th 2016. The present study is conducted in different settings that include schools and colleges in Hilla City. A non-probability "purposive" sample of (144) participant is selected and comprised of (50%) males and (50%) females. An instrument is constructed for the intent of the st

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref