Preferred Language
Articles
/
ijs-12167
Injectivity and chain conditions on y-closed submodules
...Show More Authors

Let R be a commutative ring with identity and let M be a unital left Rmodule.
Goodearl introduced the following concept :A submodule A of an R –
module M is an y – closed submodule of M if is nonsingular.In this paper we
introduced an y – closed injective modules andchain condition on y – closed
submodules.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Evaluation of Hemolysis Activity of Zerumbone on RBCs and Brine Shrimp Toxicity
...Show More Authors

Zerumbone is a well-known compound having anti-cancer, anti-ulcer, anti-inflammatory and anti-hyperglycemic effects. During its use for the disease treatment, the membrane of erythrocyte can be affected by consumption of this bioactive compound. The current study was the first report of investigation of the hemolytic activities on human erythrocytes and cytotoxic profile of zerumbone. The toxicity of zerumbone on human erythrocytes was determined by in vitro hemolytic assay. Brine shrimp lethality assay was used to evaluate the cytotoxic effect of zerumbone at concentrations 10, 100 and 1000 μg/mL. The human erythrocyte test showed no significant toxicity at low concentrations, whereas hemolytic effect was amplified up to 17.5

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Proposed Hybrid Technique in Cryptanalysis of Cryptosystem Based on PSO and SA
...Show More Authors

     Modern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.

     This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fuzzy Convergence Sequence and Fuzzy Compact Operators on Standard Fuzzy Normed Spaces
...Show More Authors

The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators  are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit  where linear operator from complete standard fuzzy normed space  into a standard fuzzy normed space  then  belongs to the set of all fuzzy bounded linear operators

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Eastern-european Journal Of Enterprise Technologies
The influence of information technology (IT) on firm profitability and stock returns
...Show More Authors

This research study examines the impact of information technology on firm profitability and stock returns. Using a comprehensive dataset of firms across various industries, this research employs rigorous statistical analysis techniques to investigate the relationship between IT investments, firm profitability metrics, and stock returns. The study focuses at how IT investments affect financial performance measures including return on assets (ROA) and return on equity (ROE), with P-values of 0.34 and 0.12, respectively. Furthermore, the study investigates the influence of IT on stock returns, taking into account market capitalization, industry trends, and macroeconomic variables. This study's conclusions center on the beneficial assoc

... Show More
View Publication
Scopus (21)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
On Light Mapping and Certain Concepts by Using m_X N-Open Sets
...Show More Authors

The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
The Saudi Dental Journal
The effects of cigarette smoking and exercise on total salivary antioxidant activity
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Visual analysis of the Kurdish women's dress and its impact on modernity
...Show More Authors

A collection of pictures of traditional Kurdish women's national clothing and contemporary clothing was collected. A visit was also made to the city of Sulaymaniyah and the city of Halabja to find out the foundations of traditional clothing for the Kurdish regions and the impact of contemporary fashion on traditional dress. Which represents the culture and regionalism and reflects the picturesque nature of northern Iraq, and in order to complete the study, the parametric measurements of the clothes were analyzed and the graphs of the dress and its accessories were re-drawn to understand and make a comparison between them to study the clear influences and changes and examine the possibility of benefiting from them in sewing contemporary f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Effect of Temperature on Reliability and Degradation of 0.63?m Laser Diode
...Show More Authors

The reliability of optical sources is strongly dependent on the degradation and device characteristics are critically dependent on temperature. The degradation behaviours and reliability test results for the laser diode device (Sony-DL3148-025) will be presented .These devices are usually highly reliable. The degradation behaviour was exhibited in several aging tests, and device lifetimes were then estimated. The temperature dependence of 0.63?m lasers was studied. An aging test with constant light power operation of 5mW was carried out at 10, 25, 50 and 70°C for 100hours. Lifetimes of the optical sources have greatly improved, and these optical sources can be applied to various types of transmission systems. Within this degradation range,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Effect of Excitation Energy and Mass number on Most probable exciton number
...Show More Authors

Exciton model describes the excitation of particles in pre-equilibrium region of nuclear reaction by exciton. In pre-equilibrium region there is a small probability for occurring emission and the number of excitons be the probability of the emission of it possible more is called most probable exciton number MPEN. In this paper the MPEN formula was derived for protons and neutrons separately and so MPEN formula derived with taking into account the non equidistant spacing between the energy states. The MPEN was studied with the mass number where it is noticed the MPEN increases with increasing the mass number. Also, MPEN studied for different isotopes of Al, the MPEN increases with increasing mass number of isotopes. MPEN for neutron is co

... Show More
View Publication Preview PDF