Preferred Language
Articles
/
jih-478
Complete Arcs in Projective Plane PG (2,11) Over Galois field
...Show More Authors

    In this work, we construct complete (K, n)-arcs in the projective plane over Galois field GF (11), where 12 2 ≤ ≤ n  ,by using geometrical method (using the union of some maximum(k,2)- Arcs , we found (12,2)-arc, (19,3)-arc , (29,4)-arc, (38,5)-arc , (47,6)-arc, (58,7)-arc, (68,6)-arc, (81,9)-arc, (96,10)-arc, (109,11)-arc, (133,12)-arc, all of them are complete arc in PG(2, 11) over GF(11).  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Complete Blood Count and Cinnamic acid activity against Cytoxan in albino mice.
...Show More Authors

The aim of study to evaluated cinnamic acid and its activity on complete blood count(RBC,WBC,HG,HCV,MCH,MCHC and Plat.)and removed the cytoxan damage which caused bone marrow failure and leukemia and other that due to linked the cytoxan in 7- nitrogen of guanine based of DNA that lead to dead cells. Two concentration from pure cinnamic acid (5.6, 2.8 mg ? mice weight) in first step to choice the perfect concentration in comparison with each negative control ,positive control of cytoxan and the comparison group represent vitamin C. The second step to understand cinnamic acid mechanism activity towards cytoxan by used pre- cytoxan and post – cytoxan in interaction with perfect concentration of cinnamic acid dose (2.8 mg ? mice we

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Bacterial Contamination of Acrylic Resin Complete Denture : In Vitro Study
...Show More Authors

Background: Cross contamination of dental appliances in the dental clinics and laboratories may potentially be a health hazard to the dental team and the patient. This study aimed to evaluate bacterial contamination of acrylic complete denture as received from dental laboratory before delivery to the patient, and then to evaluate the effectiveness of disinfection with 2% chlorhexidine and Kin denture cleaner tablet. Materials and methods: 45 newly made upper complete dentures undergone biaacterial examination for contamination before delivered to the patient. Samples were examined in two stages, first after finishing and polishing; when collected from the laboratory and before inserting to the patient mouth, second; after the samples were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 05 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation and Comparison of Complete Dentures’ Complaints: Post-insertion
...Show More Authors

Aims: This study aims to compare patients’ complaints and problems of wearing complete dentures.
Methodology: The sample included 40 Iraqi patients who are wearing complete dentures from about five years ago. They
were selected randomly with a age range between (55–65) years. The questions asked to the patients were listed according
to the recent classification of post-insertion problems.
Result: The results showed that the percentage of patient's complaint from adaptation problems (62.1%) was higher than
looseness problems (61.3%) and discomfort problems (39.3%) as followed.
Recommendation: Dentists need thorough knowledge of anatomy, physiology, pathology and psychology. The assessing
of the psyche and emotions

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Improving Video Watermarking through Galois Field <i>GF</i>(2<sup>4</sup>) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Projective Properties for Symmetrical Magnetic Lens by Using Exponential Model
...Show More Authors

A computational investigation is carried out in the field of charged particle optics with the aid of the numerical analysis methods. The work is concerned with the design of symmetrical double pole piece magnetic lens.  The axial magnetic flux density distribution is determined by using exponential model, from which the paraxial-ray equation is solved to obtain the trajectory of particles that satisfy the suggested exponential model.  From the knowledge of the first and second derivatives of axial potential distribution, the optical properties such as the focal length and aberration coefficients (radial distortion coefficient and spiral distortion coefficient) are determined.  Finally, the pole piece profiles capable of pr

... Show More
View Publication Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sat Mar 14 2020
Journal Name
Medico-legal Update,
Fasting Versus Non-Fasting in Assessing Lipid Profile and Complete Blood Picture
...Show More Authors

Scopus
Publication Date
Wed Oct 02 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Investigation over Efficient Broadcasting Mechanism in MANET
...Show More Authors

Mobile ad hoc network is nothing but the temporary network which is having the collection of mobile nodes. Routing and broadcasting are major operations of MANET network. The major operation in ad hoc mobile network is the broadcasting which sometime results to storm problem of the broadcast if the forwarding mechanism is not properly designated. Thus the challenges in the MANET are to reduce the broadcasting redundancy and under high transmission error rate provides high delivery ratio. Hence in our proposed research, we are introducing and investigating the new mechanism of broadcasting called Dual Covered Broadcast. This method takes the broadcast redundancy advantage order to improve packet delivery ratio especially under environments w

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref