Preferred Language
Articles
/
Pxahi4cBVTCNdQwCpFX8
Feeble regular and feeble normal spaces in α-topological spaces using graph
...Show More Authors

This paper introduces some properties of separation axioms called α -feeble regular and α -feeble normal spaces (which are weaker than the usual axioms) by using elements of graph which are the essential parts of our α -topological spaces that we study them. Also, it presents some dependent concepts and studies their properties and some relationships between them.

Scopus Clarivate
Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 03 2015
Journal Name
Al-ustath
Witchcraft and Women’s Spaces; A cultural Materialism Study of John Updike’s The Witches of Eastwick
...Show More Authors

Witch stories are part of American popular culture, and this culture is extremely influenced by a continuing reliance on its past. The modern obsession of Americans with witches, whether real or metaphorical, is related to politics especially when it came to issues of gender politics. This article exposes a modern image of the female character seen from a male author point of view. John Updike, influenced by the changes that happened to women within second wave of feminism, attempted to write The Witches of Eastwick (1984). Actually, he presented women who did have a sort of careers. His witches are professional active and dynamic. What do witches stand for in American Culture? Why did Updike choose to write

... Show More
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Approximate Regular Modules
...Show More Authors

There are two (non-equivalent) generalizations of Von Neuman regular rings to modules; one in the sense of Zelmanowize which is elementwise generalization, and the other in the sense of Fieldhowse. In this work, we introduced and studied the approximately regular modules, as well as many properties and characterizations are considered, also we study the relation between them by using approximately pointwise-projective modules.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
2-Regular Modules
...Show More Authors

  In this paper we introduced the concept of 2-pure submodules as a generalization of pure submodules, we study some of its basic properties and by using this concept we define the class of 2-regular modules, where an R-module M is called 2-regular module if every submodule is 2-pure submodule. Many results about this concept are given. 

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Al-khwarizmi Engineering Journal
Surface Roughness Prediction for Steel 304 In Edm Using Response Graph Modeling
...Show More Authors

Electrical Discharge Machining (EDM) is a non-traditional cutting technique for metals removing which is relied upon the basic fact that negligible tool force is produced during the machining process. Also, electrical discharge machining is used in manufacturing very hard materials that are electrically conductive. Regarding the electrical discharge machining procedure, the most significant factor of the cutting parameter is the surface roughness (Ra). Conventional try and error method is time consuming as well as high cost. The purpose of the present research is to develop a mathematical model using response graph modeling (RGM). The impact of various parameters such as (current, pulsation on time and pulsation off time) are studied on

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Applied And Computational Mathematics
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces
...Show More Authors

In this paper reliable computational methods (RCMs) based on the monomial stan-dard polynomials have been executed to solve the problem of Jeffery-Hamel flow (JHF). In addition, convenient base functions, namely Bernoulli, Euler and Laguerre polynomials, have been used to enhance the reliability of the computational methods. Using such functions turns the problem into a set of solvable nonlinear algebraic system that MathematicaⓇ12 can solve. The JHF problem has been solved with the help of Improved Reliable Computational Methods (I-RCMs), and a review of the methods has been given. Also, published facts are used to make comparisons. As further evidence of the accuracy and dependability of the proposed methods, the maximum error remainder

... Show More
View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Formal Formation and its Semantic Projections in the Design Interior Spaces of the Daily newspapers Buildings: آراء عبد الكريم حسين
...Show More Authors

The research deals with the topic of (formal formation and its semantic projections in the design interior spaces of daily newspapers buildings) including the research problem summarized by the following question: (does the formal formation do a semantic role in the design of the interior spaces?). The research objective has been evident in discovering strong and weak points in the formal formations and their semantic projections in the design of the interior spaces for the daily newspapers buildings, reaching at the best design foundations, and shedding light on the cognitive and scientific importance of the research, and the objective, temporal and spatial limits in addition to identifying the terms. The theoretical framework includes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
2-Regular Modules II
...Show More Authors

An R-module M is called a 2-regular module if every submodule N of M is 2-pure submodule, where a submodule N of M is 2-pure in M if for every ideal I of R, I2MN = I2N, [1]. This paper is a continuation of [1]. We give some conditions to characterize this class of modules, also many relationships with other related concepts are introduced.

View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
LINE REGULAR FUZZY SEMIGRAPHS
...Show More Authors

           This paper introduce two types of edge degrees (line degree and near line degree) and total edge degrees (total line degree and total near line degree) of an edge in a fuzzy semigraph, where a fuzzy semigraph is defined as (V, σ, μ, η) defined on a semigraph G* in which σ : V → [0, 1], μ : VxV → [0, 1] and η : X → [0, 1] satisfy the conditions that for all the vertices u, v in the vertex set,  μ(u, v) ≤ σ(u) ᴧ σ(v) and  η(e) = μ(u1, u2) ᴧ μ(u2, u3) ᴧ … ᴧ μ(un-1, un) ≤ σ(u1) ᴧ σ(un), if e = (u1, u2, …, un), n ≥ 2 is an edge in the semigraph G

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus