Preferred Language
Articles
/
ijs-12059
ON CLS- MODULES
...Show More Authors

Let R be a commutative ring with identity and let M be a unital left R-module.
A.Tercan introduced the following concept.An R-module M is called a CLSmodule
if every y-closed submodule is a direct summand .The main purpose of this
work is to develop the properties of y-closed submodules.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electro-less Copper Deposition on ABS Plastic
...Show More Authors

CuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.

View Publication Preview PDF
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Centralizers on Prime and Semiprime Γ-rings
...Show More Authors

In this paper, we will generalized some results related to centralizer concept on
prime and semiprime Γ-rings of characteristic different from 2 .These results
relating to some results concerning left centralizer on Γ-rings.

View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Cyber Crime and its Risks on Children
...Show More Authors

Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Crystal Properties 4SO2Influence of Doping on K
...Show More Authors

Single crystals of pure and Cu+2,Fe+2 doped potassium sulfate were grown from aqueous solutions by the slow evaporation technique at room temperature. with dimension of (11x9 x4)mm3 and ( 10x 8x 5)mm3 for crystal doping with Cu &Fe respectively. The influence of doping on crystal growth and its structure revealed a change in their lattice parameters(a=7.479 Ã… ,b=10.079 Ã… ,c=5.772 Ã…)for pure and doping (a=9.687 Ã…, b=14.926 Ã… ,c= 9.125 Ã…) & (a=9.638 Ã… , b= 8.045 Ã… ,c=3.271 Ã…) for Cu & Fe respectively. Structure analysis of the grown crystals were obtained by X-Ray powder diffraction measurements. The diffraction patterns were analyzed by the Rietveld refinement method. Rietveld refinement plo

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
On The Normality Set of Linear Operators
...Show More Authors

            In this paper, the Normality set  will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of  .

 

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Science
On Lie Structure in Semiprime Inverse Semirings
...Show More Authors

In this paper we introduce the definition of  Lie ideal on inverse semiring and we generalize some results of Herstein about Lie structure of an associative rings to inverse semirings.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On the Construction of d-Koszul algebras
...Show More Authors

An algebra has been constructed from a (D, A)-stacked algebra A, under the conditions that , A 1 and . It is shown that when the construction of algebra B is built from a (D, A)-stacked monomial algebra A then B is a d-Koszul monomial algebra.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
The Department and its impact on polygamy
...Show More Authors

 

The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism

 

View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
(α, β) – Derivations on Prime Inverse Semirings
...Show More Authors

Let S be a prime inverse semiring with center Z(S). The aim of this research is to prove some results on the prime inverse semiring with (α, β) – derivation that acts as a homomorphism or as an anti- homomorphism, where α, β are automorphisms on S.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
3D Model Watermarking based on Wavelet Transform
...Show More Authors

      In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluati

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref