Preferred Language
Articles
/
bsj-1021
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
DEPENDENCE OF MEDIA OFFICES ON THE CABINET'S WEBSITE AS A SOURCE OF INFORMATION
...Show More Authors

     The research aimed to identify the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information. Such goal includes a set of sub-goals: Knowing the reasons for media offices' reliance on the information provided by the Cabinet's website; and revealing the benefit derived from relying on the Cabinet's website.

The researcher used the survey method to screen and comprehend the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information.

The mechanism of comprehensive account of the limits of research wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Adsorption of Hydrogen Sulphide on the Zeolite type A Synthezied from Iraqi Kaoline
...Show More Authors

Three types of zeolite A were prepared from Iraqi kaoline which are 3A, 4A and 5A by ion exchange method .They were characterized by XRD and atomic absorption techniques .They were used as adsorbents to examine their applicability for H2S adsorption .The adsorption process was performed in a static form and constant volume system which constructed from stainless steel .The effect of zeolite type and temperature on the adsorption properties of H2S at -5 , 25 and 55 oC was studied .The zeolite type 5A has the highest adsorption value (79.384 µmol/g ) and the three types may be arranged in a sequence toward H2S adsorption as 5 A> 4A>3A .The amount of H2S adsorbed increased as temperature decreased from 55 to -5 for all samples. Langmuir , Fre

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (236)
Crossref (179)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Fuel
Matrix acidizing in carbonate rocks and the impact on geomechanical properties: A review
...Show More Authors

Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi

... Show More
View Publication
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (29)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Ijarah and lease ending with ownership and its implications for the bank's profits: A case study in the Emirates Islamic Bank and Emirates NBD
...Show More Authors

The formula of Ijarah and Ijarah ending with ownership is one of the investment formulas in Islamic banks, so this research has shed light on it in order to benefit from the experiences of the research sample banks, This research aims to find a reliable way for Iraqi Islamic banks, namely (leasing and leasing ending with ownership) in order to invest their money without usurious interests, The problem of the research emerges through the lack of awareness of the Iraqi Islamic banks to work with different Islamic financing formulas and their inability to invest their money through the adoption of their administrations for different formulas, including the leasing, and this is reflected in the decrease and fluctuation of its profits, Theref

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 28 2024
Journal Name
Dental Hypotheses
Assessment of Color Change of Artificial White Spot Lesions after Sandblasting with Bioactive Glass, Resin Infiltration, or Microabrasion Followed by Color Stability Test by pH Cycling: An in Vitro Study
...Show More Authors

Introduction: This study aimed to assess the color change of human teeth with artificial enamel white spot lesions (WSLs) after sandblasting with bioactive glass, resin infiltration, and microabrasion and to test color stability after pH cycling. Methods: Fifty extracted human mandibular first molars were randomly assigned into five groups: Sound, WSLs (untreated), and WSLs sandblasted with bioactive glass (Sylc), WSLs treated by resin infiltration (ICON), and WSLs treated by microabrasion (Opalustre), respectively. All specimens underwent a pH cycling procedure. The color parameters for each specimen were assessed using an Easyshade dental spectrophotometer at different time stages then the color changes (ΔE) were calculated. Results: The

... Show More
Preview PDF