Preferred Language
Articles
/
ijs-1376
Invertible Operators on Soft Normed Spaces
...Show More Authors

Despite ample research on soft linear spaces, there are many other concepts that can be studied. We introduced in this paper several new concepts related to the soft operators, such as the invertible operator.  We investigated some properties of this kind of operators and defined the spectrum of soft linear operator along with a number of concepts related with this definition; the concepts of eigenvalue, eigenvector, eigenspace are defined. Finally the spectrum of the soft linear operator was divided into three disjoint parts.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Temperature Effect on Photovoltaic Modules Power Drop
...Show More Authors

 Abstract

In order to determine what type of photovoltaic solar module could best be used in a thermoelectric photovoltaic power generation. Changing in powers due to higher temperatures (25oC, 35oC, and 45oC) have been done for three types of solar modules: monocrystalline , polycrystalline, and copper indium gallium (di) selenide (CIGS). The Prova 200 solar panel analyzer is used for the professional testing of three solar modules at different ambient temperatures; 25oC, 35oC, and 45oC and solar radiation range 100-1000 W/m2. Copper indium gallium (di) selenide module   has the lowest power drop (with the average percent

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
On The Dependent Elements of Reveres Bimultipliers
...Show More Authors

The objective of this paper is to study the dependent elements of a left (right)
reverse bimultipliers on a semiprime ring. A description of dependent elements of
these maps is given. Further, we introduce the concept of double reverse ( , )-
Bimultiplier and look for the relationship between their dependent elements.

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Glimpse on Hemostatic Changes Produced By Plasmapheresis.
...Show More Authors

Background: Aphaeresis is a term that means to separate or to take away. The basic idea of aphaeresis is efficient removal of a circulating cellular blood component, either cells (Cytopheresis) or plasma solute (plasmapheresis, plasma exchange).Thus, the treatment goal of aphaeresis is to remove the circulating cell or substance directly responsible for the disease process. Acceleration and development of aphaeresis applications had taken place with the arrival of automated cell separators in 1970s that ensure selectively removal of one or more of blood components from the blood and return the remainder to the individual. Plasmapheresis is separation of plasma from blood cells which are returned to the body.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
CT Image Segmentation Based on clustering Methods.
...Show More Authors

Background: image processing of medical images is major method to increase reliability of cancer diagnosis.
Methods: The proposed system proceeded into two stages: First, enhancement stage which was performed using of median filter to reduce the noise and artifacts that present in a CT image of a human lung with a cancer, Second: implementation of k-means clustering algorithm.
Results: the result image of k-means algorithm compared with the image resulted from implementation of fuzzy c-means (FCM) algorithm.
Conclusion: We found that the time required for k-means algorithm implementation is less than that of FCM algorithm.MATLAB package (version 7.3) was used in writing the programming code of our w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Tolerance and its impact on building society
...Show More Authors

Tolerance and its impact on building society

View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Generalized Higher Derivations on ΓM-Modules
...Show More Authors

The concepts of generalized higher derivations, Jordan generalized higher derivations, and Jordan generalized triple higher derivations on Γ-ring M into ΓM-modules X are presented. We prove that every Jordan generalized higher derivation of Γ-ring M into 2-torsion free ΓM-module X, such that aαbβc=aβbαc, for all a, b, c M and α,βΓ, is Jordan generalized triple higher derivation of M into X.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Impact of Administrative Control on subordinates coherence
...Show More Authors

Abstract:
the system of Administrative Control in organizations meets the need to check on the optimal use and proper resources and conservation to achieve the objectives sought by the organization, hence the system of Administrative Control  is part of the overall system in any organization that has undergone evolution always to be able to keep up with progress in the development of other sciences, and that the growth of coherence between subordinates in the organization means the ability to influence the opinions, ideas and attitudes to change it for directions the organization and its values ​​and this is reflected positively on the coherence of the organization, the researcher interest of the imp

... Show More
View Publication Preview PDF
Crossref