Preferred Language
Articles
/
ijs-12058
Derivable Maps of Prime Rings
...Show More Authors

Our active aim in this paper is to prove the following Let Ŕ be a ring having an
idempotent element e(e  0,e 1) . Suppose that R is a subring of Ŕ which
satisfies:
(i) eR  R and Re  R .
(ii) xR  0 implies x  0 .
(iii ) eRx  0 implies x  0( and hence Rx  0 implies x  0) .
(iv) exeR(1 e)  0 implies exe  0 .
If D is a derivable map of R satisfying D(R )  R ;i, j 1,2. ij ij Then D is
additive. This extend Daif's result to the case R need not contain any non-zero
idempotent element.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
A Visual Interface Design for Evaluating the Quality of Google Map Data for some Engineering Applications
...Show More Authors

Today, there are large amounts of geospatial data available on the web such as Google Map (GM), OpenStreetMap (OSM), Flickr service, Wikimapia and others. All of these services called open source geospatial data. Geospatial data from different sources often has variable accuracy due to different data collection methods; therefore data accuracy may not meet the user requirement in varying organization. This paper aims to develop a tool to assess the quality of GM data by comparing it with formal data such as spatial data from Mayoralty of Baghdad (MB). This tool developed by Visual Basic language, and validated on two different study areas in Baghdad / Iraq (Al-Karada and Al- Kadhumiyah). The positional accuracy was asses

... Show More
View Publication
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Strongly Convergence of Two Iterations For a Common Fixed Point with an Application
...Show More Authors

     In this paper, we study some cases of a common fixed point theorem for classes of firmly nonexpansive and generalized nonexpansive maps. In addition, we establish that the Picard-Mann iteration is faster than Noor iteration and we used Noor iteration to find the solution of delay differential equation.

 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Voprosy Istorii
Changing the agricultural map of Diyala Governorate for the years (1980, 1990, 2000, 2010, 2020) using GIS and remote sensing
...Show More Authors

Abstract. Geographical and remote sensing, which gave a picture of the change in the area of agricultural land in the study area for selected years (1980, 1990, 2000, 2010, 2020). In particular and Iraq in general, as this led to a reduction in the areas of agricultural lands and in return an increase in arid lands and their desertifica- tion and the loss of their productive value, which as a result leads to the migration of the population, the change of land sex, the failure to achieve food security and dependence on the import of the food basket.

Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 15 2018
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Simulation investigations of Micro Flexible Deep Drawing Using Floating Ring Technique
...Show More Authors

Micro metal forming has an application potential in different industrial fields. Flexible tool-assisted sheet metal forming at micro scale is among the forming techniques that have increasingly attracted wide attention of researchers. This forming process is a suitable technique for producing micro components because of its inexpensive process, high quality products and relatively high production rate. This study presents a novel micro deep drawing technique through using floating ring as an assistant die with flexible pad as a main die. The floating ring designed with specified geometry is located between the process workpiece and the rubber pad. The function of the floating ring in this work is to produce SS304 micro cups with profile

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (16)
Crossref (8)
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Reverse *-Centralizers on *-Lie Ideals
...Show More Authors

The purpose of this paper is to prove the following result : Let R be a 2-torsion free prime *-ring , U a square closed *-Lie ideal, and let T: RR be an additive mapping. Suppose that 3T(xyx) = T(x) y*x* + x*T(y)x* + x*y*T(x) and x*T(xy+yx)x* = x*T(y)x*2 + x*2T(y)x* holds for all pairs x, y  U , and T(u) U, for all uU, then T is a reverse *-centralizer.

View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map
...Show More Authors

       Recently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
New White Method of Parameters and Reliability Estimation for Transmuted Power Function Distribution
...Show More Authors

        In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3)  of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref