Preferred Language
Articles
/
bsj-3018
The Representaion of Algebraic Integers as Sum of Units over the Real Quadratic Fields: REPRESENTAION OF ALGEBRAIC INTEGERS AS SUM OF UNITS OVER THE REAL QUADRATIC FIELDS
...Show More Authors

In this paper we generalize Jacobsons results by proving that any integer  in   is a square-free integer), belong to . All units of  are generated by the fundamental unit  having the forms

Our generalization build on using the conditions

This leads us to classify the real quadratic fields  into the sets  Jacobsons results shows that  and Sliwa confirm that  and  are the only real quadratic fields in .

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
OUTDATED VOCABULARY in A. I. HERZEN's NOVEL " who is to BLAME?": УСТАРЕВШАЯ ЛЕКСИКА В РОМАНЕ А. И. ГЕРЦЕНА «КТО ВИНОВАТ?»
...Show More Authors

The article considers the main reason for A. I. Herzen's address to obsolete words, which is their ability to acquire a stylistic coloring in the context of speech, as well as the possibility of combining, in some cases, with neutral lexemes of various functional styles. A certain stylistic effect of such characteristics of this type of vocabulary is represented, as a result of which their stylistic coloring in syntagmatic terms does not coincide with stylistic coloring in terms of paradigmatics, that is, in speech they have a completely stylistic meaning. Attention is focused on the role of outdated vocabulary, which consists in the fact that they serve to implement such features of the artistic style as imagery, emotionality, and their

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FINITE ELEMENT METHOD FOR INCOMPRESSIBLE VISCOELASTIC MATERIALS
...Show More Authors

A numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Natural Convection in Trapezoidal Enclosure Heated Partially from Below
...Show More Authors

Natural convection in a trapezoidal enclosure with partial heating from below and symmetrical cooling from the sides has been investigated numerically. The heating is simulated by a centrally located heat source on the bottom wall, and four different values of the dimensionless heat source length, 1/5, 2/5, 3/5, 4/5 are considered. The laminar flow field is analyzed numerically by solving the steady, two-dimensional incompressible Navier-Stokes and energy equations. The Cartesian velocity components and pressure on a collocated (non-staggered) grid are used as dependent variables in the momentum equations  discretized by finite volume method; body fitted coordinates are used to represent the trapezoidal enclosure, and grid generatio

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Need and transgression in Surat (Abs) Semantic grammatical study: Need and transgression in Surat (Abs)
...Show More Authors

      The research aims to highlight the significance and composition and the diversity of meanings and the Quranic context in the necessary and transgressive verbs in Surat (Abs).

      This research consists of : a preamble , and two studies . The researcher addressed in the preliminary the importance of the phenomenon of necessity and infringement, the signs of the necessary action , the structure and controls of the act , the methods of infringement , its sections and signs.

      As for the first topic : The researcher addressed the necessary verbs in Surat Abs , an applied study in terms of grammati

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Basrah Journal Of Science
Nearly Maximal Submodules
...Show More Authors

Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Identifying Average Reservoir Pressure in Multilayered Oil Wells Using Selective Inflow Performance (SIP) Method
...Show More Authors

The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently.  Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r

... Show More
Preview PDF
Crossref
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Bank Deposit Guarantee Scope: Comparative Study
...Show More Authors

The guarantee of deposits came in most countries as a result of the financial crises faced by the banks, as the role of the guarantee agencies does not end to the point of enabling the depositor to recover his deposit, but rather it is considered necessary to overcome crises and stabilize the banking system.

The decisions related to the coverage determined by the types of guarantee are important, and it is required that these decisions be consistent with the policy of each guarantee to control and limit the negative effects that accompany deposit insurance, in order to face any risk that threatens deposits and confidence in them and to avoid any financial failures for the stability of the banking system and the protection of depo

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Identifying Average Reservoir Pressure in Multilayered Oil Wells Using Selective Inflow Performance (SIP) Method
...Show More Authors

The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently.  Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 20 2022
Journal Name
Journal Of Legal Sciences
Autonomous state security
...Show More Authors

The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of

... Show More
View Publication Preview PDF
Crossref