Preferred Language
Articles
/
AxclzY0BVTCNdQwC3hzr
Weak Essential Submodules
...Show More Authors

A non-zero submodule N of M is called essential if N L for each non-zero submodule L of M. And a non-zero submodule K of M is called semi-essential if K P for each non-zero prime submodule P of M. In this paper we investigate a class of submodules that lies between essential submodules and semi-essential submodules, we call these class of submodules weak essential submodules.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
A Mathematical Modelling of a Plant-Herbivore Community with Additional Effects of Food on the Environment
...Show More Authors

     By taking into account various food components in the ecosystem, the research intends to develop a set of difference equations to simulate a plant-herbivore interaction of Holling Type II. We determine the local stability of the equilibrium points for the scenarios of extinction, semi-extinction (extinction for one species), and coexistence using the Linearized Stability Theorem. For a suitable Lyapunov function, we investigate theoretical findings to determine the global stability of the coexisting equilibrium point. It is clear that the system exhibits both Flip and Neimark-Sacker bifurcation under particular circumstances using the central manifold theorem and the bifurcation theory. Numerical simulations are

... Show More
View Publication
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
ON Numerical Blow-Up Solutions of Semilinear Heat Equations
...Show More Authors

This paper is concerned with the numerical blow-up solutions of semi-linear heat equations, where the nonlinear terms are of power type functions, with zero Dirichlet boundary conditions. We use explicit linear and implicit Euler finite difference schemes with a special time-steps formula to compute the blow-up solutions, and to estimate the blow-up times for three numerical experiments. Moreover, we calculate the error bounds and the numerical order of convergence arise from using these methods. Finally, we carry out the numerical simulations to the discrete graphs obtained from using these methods to support the numerical results and to confirm some known blow-up properties for the studied problems.

View Publication Preview PDF
Scopus (14)
Crossref (3)
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Jordan generalized Γ- (σ,τ) -Derivation on Prime Γ-Near Rings
...Show More Authors

      In this paper, we introduce the notion of Jordan generalized Derivation on prime and then some related concepts are discussed. We also verify that every Jordan generalized Derivation is generalized Derivation when  is a 2-torsionfree prime .

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Kuwait Journal Of Science
Three iterative methods for solving Jeffery-Hamel flow problem
...Show More Authors

In this article, the nonlinear problem of Jeffery-Hamel flow has been solved analytically and numerically by using reliable iterative and numerical methods. The approximate solutions obtained by using the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM). The obtained solutions are discussed numerically, in comparison with other numerical solutions obtained from the fourth order Runge-Kutta (RK4), Euler and previous analytic methods available in literature. In addition, the convergence of the proposed methods is given based on the Banach fixed point theorem. The results reveal that the presented methods are reliable, effective and applicable to solve other nonlinear problems.

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Nano SC-Open Sets in Nano Topological Spaces
...Show More Authors

The objective of this paper is to define and introduce a new type of nano semi-open set which called nano -open set as a strong form of nano semi-open set which is related to nano closed sets in nano topological spaces. In this paper, we find all forms of the family of nano -open sets in term of upper and lower approximations of sets and we can easily find nano -open sets and they are a gate to more study.  Several types of nano open sets are known, so we study relationship between the nano -open sets with the other known types of nano open sets in nano topological spaces. The Operators such as nano -interior and nano -closure are the part of this paper.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of survival models to study determinants liver cancer
...Show More Authors

Cancer is one of the dangerous diseases that afflict a person through injury to cells and tissues in the body, where a person is vulnerable to infection in any age group, and it is not easy to control and multiply between cells and spread to the body. In spite of the great progress in medical studies interested in this aspect, the options for those with this disease are few and difficult, as they require significant financial costs for health services and for treatment that is difficult to provide.

This study dealt with the determinants of liver cancer by relying on the data of cancerous tumours taken from the Iraqi Center for Oncology in the Ministry of Health 2017. Survival analysis has been used as a m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Some Results on Fixed Points for Monotone Inward Mappings in Geodesic Spaces
...Show More Authors

In this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping,  a monotone inward contraction mapping is a  monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
On y-closed Dual Rickart Modules
...Show More Authors

In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
(,)- Strongly Derivations Pairs on Rings
...Show More Authors

        Let R be an associative ring. In this paper we present the definition of (s,t)- Strongly derivation pair and Jordan (s,t)- strongly derivation pair on a ring R, and study the relation between them. Also, we study prime rings, semiprime rings, and rings that have commutator left nonzero divisior with (s,t)- strongly derivation pair, to obtain a (s,t)- derivation. Where s,t: R®R are two mappings of R.

View Publication Preview PDF