Preferred Language
Articles
/
bsj-7534
Normal Self-injective Hyperrings

       In this paper normal self-injective hyperrings are introduced and studied. Some new relations between this concept and essential hyperideal, dense hyperideal, and divisible hyperring are studied. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Engineering & Technology
Influence of Percentage Replacement of Metakaolin on Different Concrete Types Exposed to Internal Sulphate Attack

This research presents an experimental investigation on the influence of metakaolin replacement percentage upon some properties of different concrete types. Three types of concrete were adopted (self- compacted concrete, high performance concrete and reactive powder concrete) all of high sulphate (SO3) percentage from the fine aggregate weight, 0.75%. Three percentages of metakaolin replacement were selected to be studied (5, 7 and 10) %. Three types of concrete properties (compressive, flexural and splitting tensile strength) were adopted to achieve better understanding for the influence of adding metakaolin.. The output results indicated that the percentage of metakaolin had a different level of positive effect on the compressive strength

... Show More
Preview PDF
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Lying in Arthur Miller's The Crucible: A Pragmatic Study: هديل محمود إبراهيم , جمعه قادر حسين

Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon May 09 2022
Journal Name
International Academic Journal Of Economics
Analysis of the Relationship between Fiscal Policy Shocks and Monetary Stability in Iraq's Economy for the Period 1990-2018

The research aims to measure the impact of positive and negative fiscal policy shocks on monetary stability in Iraq, which represents monetary stability as an indicator of real and price stability. Fiscal policy shocks are quantitative changes in public spending and public revenue affecting the output and price cycle, and fiscal policy despite the accompanying time gaps, but it remains a policy Influential and has a significant degree of impact on economic growth and development in developing countries. The fiscal policy represents a numerical translation of the economic and social objectives planned in the state's general budget tool consistent with the GDP cycle. The economic and social goals stem from the core of the functions and the ma

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Pseudo Weakly Closed Submodules and Related Concepts

Let  be a commutative ring with identity, and  be a unitary left -module. In this paper we introduce the concept pseudo weakly closed submodule as a generalization of -closed submodules, where a submodule  of an -module  is called a pseudo weakly closed submodule, if for all , there exists a -closed submodule  of  with  is a submodule of  such that . Several basic properties, examples and results of pseudo weakly closed submodules are given. Furthermore the behavior of pseudo weakly closed submodules in class of multiplication modules are studied. On the other hand modules with chain conditions on pseudo weakly closed submodules are established. Also, the relationships of  pseudo weakly closed

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Employment of exploratory factor analysis to extract factors Organizational Loyalty and job satisfaction Case Study in the College of Technology Management – Baghdad

According to the measuring the relationship between organizational loyalty and job satisfaction among staff members at one college in the higher education ministry in Iraq by using exploratory factor analysis methods to extraction the components which have the major effects on the variables related to organizational loyalty and job satisfaction .

The research contains four basic topics، the first section related to methodology and regarding the conceptual framework it is discussed in the second section، and the third section concentrated at the presentation and the analysis Scientific results and practical results are section presented in the fourth.

 

Crossref
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation Age and Gender for General Census of the population in Iraq by using nonparametric Bayesian Kernel Estimators

The process of evaluating data (age and the gender structure) is one of the important factors that help any country to draw plans and programs for the future. Discussed the errors in population data for the census of Iraqi population of 1997. targeted correct and revised to serve the purposes of planning. which will be smoothing the population databy using nonparametric regression estimator (Nadaraya-Watson estimator) This estimator depends on bandwidth (h) which can be calculate it by two ways of using Bayesian method, the first when observations distribution is Lognormal Kernel and the second is when observations distribution is Normal Kernel

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
New Common Fixed Points for Total Asymptotically Nonexpansive Mapping in CAT(0) Space

      Strong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.

Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
International Research Journal Of Engineering And Technology
A POWERFUL AUTOMATED IMAGE INDEXING AND RETRIEVAL TOOL FOR SOCIAL MEDIA Sample

The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst

... Show More
Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Strongly Essential Submodules and Modules with the se-CIP

     Let  be a ring with identity. Recall that a submodule  of a left -module  is called strongly essential if for any nonzero subset  of , there is  such that , i.e., . This paper introduces a class of submodules called se-closed, where a submodule  of  is called se-closed if it has no proper strongly essential extensions inside . We show by an example that the intersection of two se-closed submodules may not be se-closed. We say that a module  is have the se-Closed Intersection Property, briefly se-CIP, if the intersection of every two se-closed submodules of  is again se-closed in . Several characterizations are introduced and studied for each of these concepts. We prove for submodules  and  of  that a module  has the

... Show More
Scopus Crossref
View Publication Preview PDF