Preferred Language
Articles
/
ijs-12059
ON CLS- MODULES
...Show More Authors

Let R be a commutative ring with identity and let M be a unital left R-module.
A.Tercan introduced the following concept.An R-module M is called a CLSmodule
if every y-closed submodule is a direct summand .The main purpose of this
work is to develop the properties of y-closed submodules.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Global Pharma Technology
Bacteriological and enzymatical study on rheumatoid arthritis patients
...Show More Authors

The current study included the collection of 175 samples (blood-urea) of patients suffering from rheumatism, collected from Baghdad Teaching Hospital (Educational Laboratory), Al-Kindy Teaching Hospital, Al-Imamian Al-Kadhimya in Medical City in Baghdad at different duration between 2016/10/1-2017/2/1. The bacterial growth results showed that 80% of urea samples positive for bacterial culture, while the rate of samples did not show any bacterial grow this 20%. The isolation subjugates to morphological, microscopically and biochemical tests, as also diagnosis by Api system. The most frequent bacterial pathogenic is E. coli which appeared highly rate (41.97)% followed by E. cloacae (21.25)%, P. aeruginosa (12.5)%, Salmonella (10)% and the pro

... Show More
Scopus (1)
Scopus
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun May 01 2016
Journal Name
Journal Of Pharmaceutical, Chemical And Biological Sciences
Review on: Vaginitis. A problem to be solved!!
...Show More Authors

Candida is the scientific name for yeast. It is a fungus that lives almost everywhere, including in human body. Usually, the immune system keeps yeast under control. If the individual is sick or taking antibiotics, it can multiply and cause an infection. Yeast infections affect different parts of the body in different ways including thrush is a yeast infection that causes white patches in oral cavity ,Candida esophagitis is thrush that spreads to esophagus, women can get vaginal yeast infections,(vaginitis) causing itchiness, pain and discharge, yeast infections of the skin cause itching and rashes ,yeast infections in bloodstream can be life-threatening . The current review article will concentrate on vaginal infection (vaginitis), project

... Show More
Publication Date
Sun Sep 03 2023
Journal Name
Misan Journal Of Academic Studies
A review on various methods for dehazing images
...Show More Authors

In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model

... Show More
Publication Date
Fri Dec 30 2022
Journal Name
مجلة نسق
Islamic Sharia’s position on the phenomenon of bullying
...Show More Authors

The study was enriched by examining (Islamic Sharia’s position on the phenomenon of bullying) becausee bullying is a recurring aggressive behavior that Is one of the types of violence directed by a person or group of prsons; With the intent of deliberately harming and offending anotherr person or group of persons, It has several verbal, physical, electronIc or other formsforms Bullies may follow a policy of Ientimidation or intimidation, as well as ridicule; In order to belittle the victim .The study aims to know the Islamic Sharia ruling on bullying as a modern term for a content that Is as old as man, and the study reached several results, Including: Islam’s affirmation of the prohibition of this phenomenon In word, deed and gesture,

... Show More
Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Journal Of College Of Education For Women / Al-iraqiya University
Black-on-Black Bullying in Roy Williams' Fallout
...Show More Authors

Racism is a serious issue that impacts a lot of people around the world. Since slavery days, racial discrimination has been increasing to abhorrent levels in relation to black people. The aim of individual psychology by Alfred Adler is to study human behaviour by situating it in the social context which makes his writing ideal to explanation of racism. This paper aims to study racism in Roy Williams’ Fallout from the perspective of Alfred Adler’s theory. Alfred Adler's individual psychology emphasizes the importance of social factors in shaping individual behavior, including the ways in which individuals form their sense of self and identity. This makes it a valuable framework for understanding the complex social and psychological facto

... Show More
Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Second International Conference On Innovations In Software Architecture And Computational Systems (isacs 2022)
Structural flexibility and its impact on contemporary architecture
...Show More Authors

. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Secure Location Privacy Transmitting Information on Cellular Networks
...Show More Authors

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
On The extension Bi-Normality of Linear Operators
...Show More Authors

    In this paper, we introduce the bi-normality set, denoted by , which is an extension of the normality set, denoted by  for any operators  in the Banach algebra . Furthermore, we show some interesting properties and remarkable results. Finally, we prove that it is not invariant via some transpose linear operators.

View Publication
Scopus (1)
Scopus Crossref