Preferred Language
Articles
/
jBbli4cBVTCNdQwCjlXF
Brief review of soft sets and its application in coding theory

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Wed May 04 2016
Journal Name
Journal Of New Theory
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Carbon Dioxide Laser in the Treatment of Oral and Craniofacial Soft Tissue Lesions, Pros and Cons

Background and objectives: Whether to use a cold scalpel or laser surgery to remove a lesion in the skin of the craniofacial area is the main question the surgeon asks him- or herself to do. The study tried to extend the literature with data that may help the surgeons to choose the right method. Methods: Thirty patients with intra- and extraoral craniofacial skin lesions managed by Carbone dioxide (CO2) laser surgery. Results: The most common type of lesion treated was melanocytic nevi (15 patients; 50%). Conclusion: The main complication of CO2 laser surgery is the remaining permanent hypopigmentation of the treated area; however, the CO2 laser has many advantages (especially at the time of surgery) making it a good choice for the manageme

... Show More
Scopus (2)
Scopus Crossref
View Publication
Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Scopus Crossref
View Publication
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
On Еc-Continuous and δ-ßc-Continuous Mappings in Topological Spaces Via Еc-open and δ-ßc-open sets

In the present paper, new concepts of generalized continuous mappings, namely Еc and δ-ßc-continuous mappings have been introduced and studied by using a new generalized of open sets Еc and δ-ßc-open sets ,respectively. Several characterizations and fundamental properties of these forms of generalized continuous mappings are obtained. Moreover, the graphs of Еc-continuous and δ-ßc-continuous mappings have been investigated. In addition, the relationships among Еc-continuous and δ-ßc-continuous mappings and other well-known forms of g

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
MENTAL PICTURE THEORY AND PROBLEMATIC RELATIONSHIP WITH PROFILING

Walter Lippmann, speaking about man, says : ” Gradually he makes for himself a trustworthy picture inside his head of the world beyond his reach. “. This means that the picture, whether it was good or bad, it doesn’t happen for nothing, but rather for intentional purposes. Some orientalists make their judgements even before getting to the place concerned with the study.

The mental image is one of the most misused terminology, although the world today has become the world of image, it witnessed the disappearance of the theories that used to consider the media as a reflective mirror for society, also it was confirmed that the media creates what varies from reality and sometimes completely different from reality. The image of

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The Degree of Application of Digital Leadership and its Relationship to the Development of Administrative Work at the University of Tabuk

This study aims to explore the relationship between the degree of application of digital leadership and the development of administrative work at the University of Tabuk. It further aims to examine the presence of statistically significant differences between the average responses of faculty members and employees at the University of Tabuk regarding the study axes that are attributed to the following variables: (scientific rank, gender, and job), the study used the descriptive approach in its correlative style, and the questionnaire was used as a tool for data collection, as it was applied to a simple random of (310) members of the faculty and staff. University of Tabuk. The results showed that the degree of digital leadership applicatio

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Structural Design According to Constructal Theory in Architecture
Abstract<p>Constructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves </p> ... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A comparison between Bayesian Method and Full Maximum Likelihood to estimate Poisson regression model hierarchy and its application to the maternal deaths in Baghdad

Abstract:

 This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.

The comparison was done by  simulation  using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the  Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood  with sample size  (n = 30) is the best to represent the maternal mortality data after it has been reliance value param

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
Breaching the Cooperative Principle Theory in English and Russian One Act Plays

PDBNRSIA Asst, International Journal of Research in Social Sciences and Humanities, 2018

View Publication