Preferred Language
Articles
/
ijs-1102
Sum Ideal Graphs Associated to a Given Ideal of a Commutative Ring
...Show More Authors

The aim of this paper is to introduce and study a new kind of graphs associated to an ideal of a commutative ring. Let â„› be a commutative ring with identity, and I(â„›) be the set of all non-trivial ideals of â„› with S I(â„›). The sum ideal graph associated to S, denoted by       Î¨(â„›, S), is the undirected graph with vertex set {A I(â„›): S⊂A+B, for some B I(â„›)} where two ideal vertices A and B are adjacent if and only if A B and S⊂A+B. In this paper we establish some of characterizations and results of this kind of graph with providing some examples.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 11 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Difference in Contributing Factors and Costs Associated with Outpatient Refusal to Accept Cardiovascular Medications or Analgesics During Dispensing Process.
...Show More Authors

Background: Study looking into cardiovascular disorders (CVD) medicines or analgesics cost-saving activities during dispensing process is lacking.

Aim: To determine differences in factors and costs associated with refused CVD medicines or analgesics during dispensing process

Method: This study was approved by Medical Research and Ethics Committee (MREC) (Registration number: NMRR-20-177-53153(IIR)). Participants receiving CVD medicines or analgesics during dispensing process were recruited via convenience sampling technique between February and March 2020 at the Specialist Pharmacy Department of Jerantut Hospital, Malaysia. Refusal to medications and its reasons were asked based on the questionnaire developed by the resea

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Use of Nicotiana tobaccum extractions as a molluscicide to the snail of Bulinus truncates
...Show More Authors

Nicotiana tobaccum L (Solanacea) extracts are used as a mollusciede to the snail Bulinus truncatus the intermediate host of urinary Schistosomiasis. LC50 of the extracts to the snail with 24 hour was 3.27 ml/l? 48 hour was 3.33 ml/l? 72 hour was 2.67 ml/l and 96 hour was 2.28ml/l. This study showed the ability to use the leaf extracts in the control of this type of snail.

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 08 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Periodontitis among a Group of Type TwoDiabetic Patientsin Relation to Risk of Vascular Disease
...Show More Authors

Background: Type two diabetic patients have higher risk of cardiovascular and periodontal disease. Furthermore, patients with more severe periodontal disease have higher incidence of cardiovascular disease. This study aimed to assess the association between periodontal health status and the risk of vascular disease in type 2 diabetic patients. Materials and Methods: One hundred type 2 diabetes mellitus patients and fifty apparently healthy males were enrolled in this study. Oral examinations conducted were; plaque Index, calculus index, gingival index, probing pocket depth, and clinical attachment level. For the assessment of vascular risk, arterial stiffness index was used. Results: According to arterial stiffness index, type 2 diabetic p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 12 2020
Journal Name
Medico-legal Update
Assessing the Response of a Sample of Iraqi Asthmatic Patients to Different Medication Regimens
...Show More Authors

Asthma is a chronic inflammatory disease of respiratory airways characterized by distinctive history of respiratory symptoms due to variable airflow obstruction which reverses either spontaneously or in response to certain medications. Acetylcholine is a parasympathetic neurotransmitter which plays fundamental roles in the development of persistent asthma. Treatment guidelines recommend using medium doses of inhaled corticosteroids in addition to another controller bronchodilator instead of using high doses inhaled steroid alone for treatment of moderate to severe persistent asthma. The inhaled long acting muscarinic antagonist, tiotropium, was approved recently to control unresponsive asthma to inhaled corticosteroid with or without a long

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Suggestion To Solve The Problem Of Asynchronous File Uploads In ASP.NET Without The Need To Use Ajax Technology
...Show More Authors

The file upload is one of the controls of the tool bar of the VisualStodio.NET, but it can’t be used with Ajax technology (It's almost impossible today to be involved in web application design or development and not be aware of Ajax) because the file upload control don’t support Ajax technology that the execution of the instruction is not completed or the (object is not set) message will appear, although the essential need to use this control with Ajax to gain the asynchronous data transfer that supplied by Ajax, because the file upload don’t work without the Postback operation from the client to the server, and the main idea of Ajax technology is working without Postback operation to the server. After the deep resea

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 08 2025
Journal Name
Journal Of Baghdad College Of Dentistry
A comparative study to evaluate the shear bond strength of different resin sealers to dentin (An in vitro study)
...Show More Authors

Background: One of the major problems in endodontics is micro-leakage of root canal fillings which might contribute to the failure of endodontic treatment. To avoid this problem, a variety of sealers have been tested. The objective of this, in vitro, study was to evaluate the shear bond strength of four resin based sealers (AH plus, silver free AH26, RealSeal SE and Perma Evolution permanent root canal filling material) to dentin. Materials and Methods: Forty non-carious extracted lower premolars were used. The 2mm of the occlusal surfaces of teeth were sectioned, to expose the dentin surface. The exposed dentin surfaces of teeth were washed with 5ml of 2.5% NaOCl solution followed by 5ml of 17 % EDTA then rinsed by deionized water to remov

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Engineering
Numerical analysis of a concrete foundation under a combination of a dynamic and a seismic load
...Show More Authors

Improving in assembling technology has provided machines of higher evaluation with better resistances and managed behavior. This machinery led to remarkably higher dynamic forces and therefore higher stresses. In this paper, a dynamic investigation of rectangular machine diesel and gas engines foundation at the top surface of one-layer dry sand with various states (i.e., loose, medium and dense) was carried out. The dynamic investigation is performed numerically by utilizing limited component programming, PLAXIS 3D. The soil is accepted as flexible totally plastic material submits to Mohr-Coulomb yield basis. A harmonic load is applied at the foundation with amplitude of 10 kPa at a frequency of (10, 15 and 20) HZ and se

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Economics Department Assessment of Nutritional a program to student of internal departments in the University of Baghdad (Jadriy a complex ) and the University of mustnsiriy
...Show More Authors

The present study aimed to asspssment the nutrition a program to sample of student from internal departments of Baghdad University (AL-Jadiriya Complex) and the University of AL-MustanSiriya four grades and aged (19-24) year study included 150 male and female students by (75) male and (75) of female register height, weight nd body mass index were study habits and food pattern of the same sample (150) and by aspecial form and take the personal information interviews and record information on food intake during 24 hour .noted adifference practie in the weights and longths of male and female (sample).
BMI rates were within the normal weight as the value of BMI for males aged (19- 21)and (22-24) and (22.21) and (23,37),respectively and th

... Show More
View Publication Preview PDF