Preferred Language
Articles
/
bsj-8381
A Characterization of Maximal Outerplanar-Open Distance Pattern Uniform Graphs
...Show More Authors

Let A ⊆ V(H) of any graph H, every node w of H be labeled using a set of numbers; , where d(w,v) denotes the distance between node w and the node v in H, known as its open A-distance pattern. A graph H is known as the open distance-pattern uniform (odpu)-graph, if there is a nonempty subset A ⊆V(H) together with  is the same for all . Here  is known as the open distance pattern uniform (odpu-) labeling of the graph H and A is known as an odpu-set of H. The minimum cardinality of vertices in any odpu-set of H, if it exists, will be known as the odpu-number of the graph H. This article gives a characterization of maximal outerplanar-odpu graphs. Also, it establishes that the possible odpu-number of an odpu-maximal outerplanar graph is either two or five only.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Iraq J Embryos Infert Res
The effects of progesterone on mice offspring testis development and anogenital distance postnatally
...Show More Authors

Background: Analysis of human reports and comparison with results of experimental animals indicate that the effects of progesterone on human not analogous to experimental animals fetus, many studies showed that exposure to progesterone during developing of genital tract of human fetus was not teratogenic. Other studies which performed on laboratory animals found association between progesterone administration during gestation and genital malformation. Objectives: to explore the effect of progesterone in 10.2 mg/kg intraperitoneal injection in mice on testis development and anogenital distance. Materials and Methods: ten pregnant mice divided into five mouse control group that injected10. 2mg/kg sesame oil and treated group that injected pro

... Show More
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Component of Pattern Materials and Its Influence on Physical Properties
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Dec 26 2025
Journal Name
Mustansiriya Medical Journal
The Pattern Of Skin Diseases Among Kindergarten Children In Baghdad. A Comparative Study Between Two Surveys Five Years Apart
...Show More Authors

View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
The Surgical outcomes of fundus-first technique in lowering the rate of bile duct injuries and bleeding during open cholecystectomy that facing intraoperative difficulties: A single-center prospective study: The surgical outcomes of open fundus-first cholecystectomy technique.
...Show More Authors

Background: The problem of difficult gallbladder is not clearly defined and associated with real missing of therapeutic approaches that decreased morbidity. Moreover, the difficult gallbladder was reported as a contributing risk factor for biliary injury due to raised difficulty in surgical dissection within Calot’s triangle. The aim of this study is to determine the surgical outcomes of the open fundus-first cholecystectomy in lowering the rate of lethal intraoperative risks.

Subjects and Methods: Our prospective study conducted during the period of January 2019 to December 2022 at Ibn Sina specialized hospital, Khartoum, Sudan, for two hundred and fifty-three patients underw

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Is co2 laser Hemorrhoidectomy superior to conventional open Hemorrhoidectomy?
...Show More Authors

Background: Hemorrhoids are one of the most
common surgical conditions .Conventional
haemorrhoidectomy was the traditional operation for
the treatment of hemorrhoids. Other modalities of
treatment had been used as an alternative operations
including CO2 laser haemorrhoidectomy.
Objectives: To determine the outcome of treatment
of hemorrhoids by using CO2 laser
haemorrhoidectomy and its advantages over
conventional surgery
Methods: This is a retrospective comparative
interventional study of 1024 case of third degree
haemorhoids selected out of 1300 case of
hemorrhoids of different degrees, admitted to
ALKINDY, ALYERMOUK teaching hospitals and
ABD ALMAGEED private hospital, from May 1998
to J

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
RESPONSE OF FABA BEAN TO PLANTING DISTANCE BETWEEN PLANTS AND SPRAYING WITH NANO AND TRADITIONAL BORON: RESPONSE OF FABA BEAN TO PLANTING DISTANCE BETWEEN PLANTS AND SPRAYING WITH NANO AND TRADITIONAL BORON
...Show More Authors

A field experiment was conducted during winter season of 2021 at a research station of college of agricultural engineering sciences, university of Baghdad to determine the response of active fertility percentage and seed yield and its components of faba bean (Vicia faba L. cv. Aguadulce) to distance between plants and spraying of nano and traditional boron. A Randomized Complete Block Design according to split-plots arrangement was used at three replicates. The main plots were three distances between plants (25, 35 and 45 cm), while the sub plots including spraying of distilled water only (control treatment), spraying of boron at a 100 mg L-1 and spraying of nano boron at two concentrations (1

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
A comparative study of Williamson-Hall method and size-strain method through X-ray diffraction pattern of cadmium oxide nanoparticle
...Show More Authors

In this research, the Williamson-Hall method and of size-strain plot method was employed to analyze X- ray lines for evaluating the crystallite size and lattice strain and of cadmium oxide nanoparticles. the crystallite size value is (15.2 nm) and (93.1 nm) and lattice strain (4.2 x10−4 ) and (21x10−4) respectively. Also, other methods have been employed to evaluate the crystallite size. The current methods are (Sherrer and modified Sherrer methods ) and their results are (14.8 nm) and (13.9nm) respectively. Each method of analysis has a different result because the alteration in the crystallite size and lattice strain calculated according to the Williamson-Hall and size-strain plot methods shows that the non-uniform strain in nan

... Show More
View Publication
Scopus (38)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Employing Microteaching in Acquiring Teaching Skills for Students Teaching The Basic Stage in Al-Aqsa University- Gaza
...Show More Authors

The study aims to identify the effectiveness of employing microteaching in acquiring teaching skills of students teaching basic stage in Al-Aqsa University. The two researchers used the experimental method and a quota sample consisted of a group of (80) students who were distributed on the university two branches in Gaza and Khan younis and on males and females equally, and on four teaching courses counted (20) students for each. The study tool represented in an observation card ,and the results showed statistically significant differences between the level of all the skills of teaching and between the standard rate (75%) in favor of teaching skills, also showed statistically significant differences attributed to the variable of the univ

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
نسق
Problems and Difficulties Faced by Iraqi University Students in Employing Distance Learning
...Show More Authors