Preferred Language
Articles
/
bsj-542
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings and modules. .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Bubble Size Distribution In Gas-Liquid Dispersion Column
...Show More Authors

The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Prediction of Monthly Fluoride Content in Tigris River using SARIMA Model in R Software
...Show More Authors

The need to create the optimal water quality management process has motivated researchers to pursue prediction modeling development. One of the widely important forecasting models is the sessional autoregressive integrated moving average (SARIMA) model. In the present study, a SARIMA model was developed in R software to fit a time series data of monthly fluoride content collected from six stations on Tigris River for the period from 2004 to 2014. The adequate SARIMA model that has the least Akaike's information criterion (AIC) and mean squared error (MSE) was found to be SARIMA (2, 0, 0) (0,1,1). The model parameters were identified and diagnosed to derive the forecasting equations at each selected location. The correlat

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Impact of omega 3 alone or in combination with irinotecan on bone marrow and spleen of rats: in vivo study
...Show More Authors

Abstract

Objectives: The present study designed to explore the genotoxicity through measurement of Mitotic index in bone marrow and the spleen cells, as possible mechanism of bone marrow and spleen toxicity that induced by irinotecan; and to describe the protective actions of omega 3 against irinotecan induced genotoxicity in bone marrow and the spleen of rats.

Methods: Twenty four (24) rats (Sprague-Dawley) were randomly divided into four groups: Group Ӏ, rats  received single oral daily dose of distilled water (2 ml/kg) for 25 days (negative control group); Group ӀӀ (irinotecan-treated), receiv

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 24 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Mechanical Properties Enhancement of Conventional Glass Ionomer Cement by Adding Zirconium Oxide Micro and Nanoparticles
...Show More Authors

The aim of this work is to enhance the mechanical properties of the glass ionomer cement GIC (dental materials) by adding Zirconium Oxide ZrO2 in both micro and nano particles. GIC were mixed with (3, 5 and 7) wt% of both ZrO2 micro and nanoparticles separately. Compressive strength (CS), biaxial flexural strength (BFS), Vickers Microhardness (VH) and wear rate losses (WR) were investigated. The maximum compression strength was 122.31 MPa with 5 wt. % ZrO2 micro particle, while 3wt% nanoparticles give highest Microhardness and biaxial flexural strength of 88.8 VHN and 35.79 MPa respectively. The minimum wear rate losses were 3.776µg/m with 7 wt. % ZrO2 nanoparticle. GIC-contai

... Show More
View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Determining and Predicting the Water Demand Dynamic System Model Mapping Urban Crawling and Monitoring Using Remote Sensing Techniques and GIS
...Show More Authors

The problem of rapid population growth is one of the main problems effecting countries of the world the reason for this the growth in different environment areas of life commercial, industrial, social, food and educational. Therefore, this study was conducted on the amount of potable water consumed using two models of the two satellite and aerial images of the Kadhimiya District-block 427 and Al-Shu,laa district-block 450 in Baghdad city for available years in the Secretariat of Baghdad (2005, 2011,2013,2015). Through the characteristics of geographic information systems, which revealed the spatial patterns of urban creep by determining the role and buildings to be created, which appear in the picture for the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Possibility of applying international AACSB accreditation standards in the faculties of business and Economics- case study in the college of management and Economics-University of Baghdad
...Show More Authors

Attention increased to the topic of academic accreditation by the university as a modern philosophy by which to improve its performance and provide high-quality education. Universities and colleges in general and Iraqi universities and colleges in particular have begun interest in accreditation and desire to get it. So starting from the pursuit of the Administration and Economics College / Baghdad University in obtaining accreditation of Association to Advance Collegiate Schools of Business (AACSB) The research is present which aims to determine the level of application (AACSB) International standards at the College of Administration and Economics / Baghdad University in preparation to get its accreditation in the future. Researc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Effects of Macroeconomic Variables on Gross Domestic Product in Saudi Arabia using ARDL model for the period 1993-2019
...Show More Authors

 

This paper analyses the relationship between selected macroeconomic variables and gross domestic product (GDP) in Saudi Arabia for the period 1993-2019. Specifically, it measures the effects of interest rate, oil price, inflation rate, budget deficit and money supply on the GDP of Saudi Arabia. The method employs in this paper is based on a descriptive analysis approach and ARDL model through the Bounds testing approach to cointegration. The results of the research reveal that the budget deficit, oil price and money supply have positive significant effects on GDP, while other variables have no effects on GDP and turned out to be insignificant. The findings suggest that both fiscal and monetary policies should be fo

... Show More
View Publication Preview PDF
Crossref