The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Singing has significant importance being a major basis for the expressive and cultural production of the societies and a real companion that reflects their artistic career and is strongly connected to the reality of the peoples and the production of the individuals, who are geniuses of arts and culture.
Rural singing represents one of the most well-known artistic singing styles in Iraq, which truly embodied the Iraqi national identity. However, it remained confined to the countryside and did not spread due to the lack of mass media and the recording technologies at that time. It has been pure virgin singing art. The theoretical framework is divided into three axes:
• The Iraqi singing heritage in the twentieth century, a hi
... Show MoreFace recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.
The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreThe specimens of Camponotusxerxes Forel, 1904 were collected from different localities in Iraq; the purpose of morphological study of this species in details throughout the present study.
The description was based on major workers belonging to this species, also some notes of polymorphism in workers have been mentioned; the most important of morphological features are illustrated and figured.
The research discusses the obstacles that faced the Iraqi strategic performance in achieving sustainable development after the election of the first Iraqi government in 2005 and the most important strategies to overcome these obstacles.
has experienced a step-change since the inception of ambient mass spectrometry removed the requirement for samples to be investigated under vacuum conditions. Approaches based on surface– plasma interactions are especially promising, including PADI. Whilst the mechanisms involved in generating PADI spectra still need to be unravelled, PADI shows significant promise to become a valuable and versatile tool in the instrumental arsenal available to the surface analyst
The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More