Preferred Language
Articles
/
URd255IBVTCNdQwCOMM9
Modules Whose St-Closed Submodules are Fully Invariant
...Show More Authors

The duo module plays an important role in the module theory. Many researchers generalized this concept such as Ozcan AC, Hadi IMA and Ahmed MA. It is known that in a duo module, every submodule is fully invariant. This paper used the class of St-closed submodules to work out a module with the feature that all St-closed submodules are fully invariant. Such a module is called an Stc-duo module. This class of modules contains the duo module properly as well as the CL-duo module which was introduced by Ahmed MA. The behaviour of this new kind of module was considered and studied in detail,for instance, the hereditary property of the St-duo module was investigated, as the result; under certain conditions, every St-closed submodule of an St-duo module is also St-duo. Another characterization of the Stc-duo module was given. Additionally, the relationships of St-duo among some types of modules were investigated and discussed, for example; In the class of semi-extending modules, every weak duo module is anStc-duo module.Also, the authors gave a case in which St-duo, duo, CL-duo and weak duo are equivalent. Furthermore, the St-duo module was used to make the concepts semi-extending and FI-extending equivalent

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximaitly Semi-Prime Submodules and Some Related Concepts
...Show More Authors

    We introduce in this paper the concept of approximaitly semi-prime submodules of unitary left -module  over a commutative ring  with identity as a generalization of a prime submodules and semi-prime submodules, also generalization of quasi-prime submodules and approximaitly prime submodules. Various basic properties of an approximaitly semi-prime submodules are discussed, where a proper submodule  of an -module  is called an approximaitly semi-prime submodule of  , if whenever , where ,  and , implies that . Furthermore the behaviors of approximaitly semi-prime submodule in some classes of modules are studied. On the other hand several characterizations of this concept are

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Solving Fractional Damped Burgers' Equation Approximately by Using The Sumudu Transform (ST) Method
...Show More Authors

       In this work, the fractional damped Burger's equation (FDBE) formula    = 0,

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
Are Indications For Esophago Gastro Duodenoscopy Properly Followed?
...Show More Authors

Background: Symptoms related to the upper gastro-intestinal tract are very common. Attribution of these symptoms to upper G. I. T.diseases are usually done on clinical bases, which could be confirmed by Esophago Gastro Duodenoscopy (EGD). The use of such tools might increase the diagnosis accuracy for such complaints. The indications for upper G I endoscopy might decrease the negative results of endoscopies.Objective: To follow strict indications for Esophago Gastro Duodenoscopy in order to decrease the negative endoscopy results. Methods: One thousand eight hundred and ninety cases were subjected to EGD from Feb. 1999 to Feb 2009 at Alkindy Teaching Hospital and Abd-Al-Majeed private hospital in Baghdad, Iraq. A special endoscopy unit f

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
E-small prime sub-modules and e-small prime modules
...Show More Authors

Scopus Crossref
Publication Date
Thu Apr 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
The Invariant Moments Based With Wavelet Used To Decide the Authintication and Originality of Images
...Show More Authors

Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Invariant Moments Based With Wavelet Used To Decide the Authintication and Originality of Images
...Show More Authors

 The digital image with  the wavelet tools  is increasing nowadays with MATLAB library, by using  this method based on invariant moments which are  a set of seven moments can be derived from the second and third moments , which can be calculated after converting the image from colored map to gray scale , rescale the image to (512 * 512 ) pixel , dividing the image in to four equal pieces (256 * 256 ) for each piece , then for gray scale image  ( 512 * 512 ) and the four pieces (256 * 256  ) calculate  wavelet with moment and invariant moment, then  store  the result with the author ,owner for this image to build data base for the original image to decide the authority of these images by u

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weak Pseudo – 2 – Absorbing Submodules And Related Concepts
...Show More Authors

      Let  R  be a commutative ring  with identity  and  E  be a unitary left  R – module .We introduce  and study the concept Weak Pseudo – 2 – Absorbing submodules as  generalization of weakle – 2 – Absorbing submodules , where a proper submodule  A of  an  R – module  E is  called  Weak Pseudo – 2 – Absorbing  if   0 ≠ rsx   A   for  r, s  R , x  E , implies that  rx   A + soc ( E ) or  sx  A + soc (E)  or   rs  [ A + soc ( E ) E ]. Many basic  properties, char

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Energy and Exergy Analysis on Modified Closed Wet Cooling Tower in Iraq
...Show More Authors

The present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy

... Show More
View Publication Preview PDF