Preferred Language
Articles
/
2ReSfY8BVTCNdQwC1nmF
Semi-Small Compressible Modules and Semi-Small Retractable Modules
...Show More Authors

Let  be a commutative ring with 1 and  be left unitary  . In this paper we introduced and studied concept of semi-small compressible module (a     is said to be semi-small compressible module if  can be embedded in every nonzero semi-small submodule of . Equivalently,  is  semi-small compressible module if there exists a monomorphism  , ,     is said to be semi-small retractable module if  , for every non-zero  semi-small sub module in . Equivalently,  is semi-small retractable if there exists a homomorphism  whenever  .     In this paper we introduce and study the concept of semi-small compressible and semi-small retractable s as a generalization of compressible  and retractable  respectively and give some of their advantages characterizations and examples.  

Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Personal Efficacy And Its Relationship With Mindfulness Among University Students
...Show More Authors

The study seeks to examine the level of personal efficacy and its relation to mental alertness among university students. Besides, the statistically significant differences in regard of students' gender, and the correlation between male and female. To do this, the researcher adopted two scales: one to measure the personal efficacy which was made up by (abed al-jabaar, 2010) included (26) items, and the other to measure the mental alertness that designed by (abed Allah, 2012) included (36) items. A total of (120) student were selected randomly from three-different colleges at the Al-Mustansiriyah University for the academic year 2016-2017. The findings revealed there are no significant differences among students in regard of the personal

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
HLA Typing in Iraqi Patients with Obesity and Primary Osteoarthritis.
...Show More Authors

Background: Osteoarthritis (OA) is a degenerative joint disease. It is one of the major causes of disability in developed and developing countries. Human leukocyte antigen (HLA) as part of immune system has a role in the disease process.Objectives: To investigate whether there is an association between HLA class II-DRB and OA.Methods: A case control study with 26 patients with osteoarthritis and 22 apparently healthy obese control persons matching in ethnicity were enrolled in this study during the period between October 2012 till March 2013. Direct interview was done with each patient and HLA typing was done by molecular method using Sequence Specific Primer (PCR-SSP) method using One Lambda Kit-USA. Results: The results showed that fem

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Compared Methods of Generating Both Gamma Distribution and Beta Distribution
...Show More Authors

Beta Distribution

Abstract

             Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions.    &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Infants’ Obesity and Overweight in Relation to Type of Feeding
...Show More Authors

Abstract Objective (s): To identify the prevalence of obesity and overweight in infants and children less than 2 years of age and its relationship with type of feeding in a sample of children attending Al- Kadhymia primary health care center. Methodology: This study was a descriptive survey carried out in, the primary health care centre of Al-Kadhymia town in Baghdad during the period from 5th of July 2009-1st of May 2010. Sample was chosen by non probability convenience sampling and it included 744 infant and children. Data were gathered by a combination of a structured questionnaire and measurements o

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Hypothyroidism and AMH in Iraqi Patients with Chronic Kidney Disease
...Show More Authors

This study was conducted to investigate thyroid function and Anti-Müllerian hormone (AMH) in (Chronic kidney disease) CKD patients by evaluating their levels in CKD patients, 50 patients were diagnosed to have CKD stage-5, their ages ranged between 20-50 years (25 males and 25 females) who attended the Nephrology and Transplant Center in Medical City of Baghdad- Iraq, they were recruited from April 2018 to July 2018 and were enrolled into the study. The control group consisted of 20 healthy individuals, their ages ranged between 20-48 years (10 males and 10 females). The study showed non-significant (p>0.05) increase in AMH level in CKD patients compared to the control group. On the other hand, TSH was recorded a highly significant (

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORDS ON SALTICIDAE AND THERIDIIDAE (ARANEAE) SPIDERS FROM ARMENIA
...Show More Authors

New data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Arab spring and problematic prescriptions capitalist construction in transitional economy
...Show More Authors

ان الرأسمالية ليست بناءً هندسياً يتم انتظامه وفقاً للنظريات الهندسية والمعادلات الرياضية والفنون المعمارية، لأنها ببساطة نظاماً اجتماعياً يقوم على تشكيلة اقتصادية معينة، والأخيرة تقوم على مستوى معين لتطور قوى الانتاج (التكنولوجيا) والذي يقوم عليه مستوىً معين لعلاقات الإنتاج، ويقوم على التشكيلة الاقتصادية/ نمط الإنتاج نظاماً سياسياً، هو جزء من البناء الفوقي، ولأنها نظاماً اجتماعياً بالمواصفات انفة

... Show More
View Publication Preview PDF
Crossref