Preferred Language
Articles
/
ijs-1153
Proving the Equality of the Spaces Q_b^r (A),Q_b^l (A) and BL(X) where X is a Complex Banach Space
...Show More Authors

Cabrera and Mohammed proved that the right and left bounded algebras of quotients  and  of norm ideal  on a Hilbert space  are equal to  Banach algebra of all bounded linear operators on . In this paper, we prove that  where  is a norm ideal on a complex Banach space .

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Nasaq Journal
The Effect of Co-text on the Comprehensibility of World Englishes
...Show More Authors

MR Younus, Nasaq Journal, 2022

View Publication
Publication Date
Sat Dec 28 2024
Journal Name
Hammurabi Journal For Studies
(The impact of legislative drafting on the achievement of electoral justice)
...Show More Authors

View Publication
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Rhetoric of the ellipses   In the poetry of Namik Abdul Deeb
...Show More Authors

The research attempts to identify the pattern of punctuation in contemporary Iraqi poetry through delving into the poetry of an Iraqi poet belonging to the seventieth generation, Namik Abdul Deeb, who belongs to the poets of Arab modernity in general, the research has reached many results, including that the signs of deletion were vocabulary marks any They are located in the center of the poetic singular, or inline markers, which are those that fall within the poetic line of the prose poem separating its vocabulary, or cross-sectional marks located within the poetic passages that are part of the poetic text, and finally text marks which are located within the poetic text and fragmented into Parts. The research also found that the work of

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 12 2021
Journal Name
Applied System Innovation
The Role of Correlation in the Performance of Massive MIMO Systems
...Show More Authors

Massive multiple-input multiple-output (m-MIMO) is considered as an essential technique to meet the high data rate requirements of future sixth generation (6G) wireless communications networks. The vast majority of m-MIMO research has assumed that the channels are uncorrelated. However, this assumption seems highly idealistic. Therefore, this study investigates the m-MIMO performance when the channels are correlated and the base station employs different antenna array topologies, namely the uniform linear array (ULA) and uniform rectangular array (URA). In addition, this study develops analyses of the mean square error (MSE) and the regularized zero-forcing (RZF) precoder under imperfect channel state information (CSI) and a realist

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Representations of the Metaverse in the Works of Potter Jason Walker
...Show More Authors

The current research studies (representations of metaphysics in the works of potter Jason Walker) a concept that refers to To a large extent, by conveying a sense of reality to the recipient by conveying ideas, contents, and connotations. A variety of center hit, dispersion, and rejection of everything that prevails, so our position on the closed text has shifted To the open text, through the role played by cross-pollination in the works of the potter (Jason Walker), which established a clear hypothetical vision of the image represented in the construction of the ceramic work and the thought that was embodied in that image represented by the nature of its unrealistic formations for those ceramic artworks. It is thus considered a logical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study of the Factors Affecting the Efficiency of Reverse Osmosis Process
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
The Effect of Hydraulic Accumulator on the Performance of Hydraulic System
...Show More Authors

The purpose of this paper is to depict the effect of adding a hydraulic accumulator to a hydraulic system. The experimental work includes using measuring devices with interface to measure the pressure and the vibration of the system directly by computer so as to show the effect of accumulator graphically for real conditions, also the effects of hydraulic accumulator for different applications
have been tested. A simulation analysis of the hydraulic control system using MATLAB.R2010b to study was made to study the stability of the system depending on the transfer function, to estimate the effect of adding the accumulator on stability of the system. A physical simulation test was made for the hydraulic system using MATLAB to show the ef

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Improvement of the technique for the solution method of Gauss Seidel
...Show More Authors

In this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 28 2021
Journal Name
College Of Islamic Sciences
The concept of the phenomenon of nuns: an analytical ideological study
...Show More Authors

ملخص البحث باللغة الإنجليزية

The concept of the phenomenon of nuns: an analytical ideological study

Dr. Samia bint Yassin Al-Badri

Department of Islamic Doctrine & Contemporary Ideologies

College of Shariʿah & Islamic Studies

Qassim University

 

The study of concepts is one of the main pillars of doctrinal studies, in order to understand the formation of the concept, and to understand its contexts in religious sources, in order to be systematically criticized; So, this research came with the title:

The concept of the phenomenon of nuns, an analytical doctrinal study

The study concluded with resu

... Show More
View Publication Preview PDF