Preferred Language
Articles
/
ijs-2008
Weak and Strong Forms of ω-Perfect Mappings
...Show More Authors

In this paper, we introduce weak and strong forms of ω-perfect mappings, namely the -ω-perfect, weakly -ω-perfect and strongly-ω-perfect mappings. Also, we investigate the fundamental properties of these mappings. Finally, we focused on studying the relationship between weakly -ω-perfect and strongly -ω-perfect mappings.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Strong Differential Sandwich Results for Analytic Functions Associated with Wanas Differential Operator
...Show More Authors

    In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Phenyl Thiourea as Corrosion Inhibitor for Mild Steel in Strong Hydrochloric Acid
...Show More Authors

The inhibitive action of Phenyl Thiourea (PTU) on the corrosion of mild steel in strong Hydrochloric acid, HCl, has been investigated by weight loss and potentiostatic polarization. The effect of PTU concentration, HCl concentration, and temperature on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in 5-7N HCl at temperatures 30, 40 and 50 °C, in absence and presence of PTU. It was verified that all variables and their interaction were statistically significant. The adsorption of (PTU) is found to obey the Langmuir adsorption isotherm. The effect of temperature on th

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Strong Subordination for E -valent Functions Involving the Operator Generalized Srivastava-Attiya
...Show More Authors

Some relations of inclusion and their properties are investigated for functions of type " -valent that involves the generalized operator of Srivastava-Attiya by using the principle of strong differential subordination.

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Some Results on Fixed Points for Monotone Inward Mappings in Geodesic Spaces
...Show More Authors

In this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping,  a monotone inward contraction mapping is a  monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modified Iterative Solution of Nonlinear Uniformly Continuous Mappings Equation in Arbitrary Real Banach Space
...Show More Authors

 In this paper, we study the convergence theorems of the Modified Ishikawa iterative sequence with mixed errors for the uniformly continuous mappings and solving nonlinear uniformly continuous mappings equation in arbitrary real Banach space.

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
El porqué de la confusión entre el pretérito indefinido y el imperfecto en la lengua española para alumnos de Irak The reason of confusion between past perfect and imperfect in Spanish for Iraqi students
...Show More Authors

Las diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.

En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:

"El aprendizaje de una segunda lengua (L2) es el

... Show More
View Publication
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Comparing Ionospheric MUF using IRI16 Model with Mid-Latitude Ionosonde Observations and Associated with Strong Geomagnetic Storms
...Show More Authors

High frequency (HF) radio wave propagation depends on the ionosphere status which is changed with the time of day, season, and solar activity conditions. In this research, ionosonde observations were used to calculate the values of maximum usable frequency (MUF) the ionospheric F2- layer during strong geomagnetic storms (Dst ≤ -100 nT) which were compared with the predicted MUF for the same layer by using IRI-16 model. Data from years 2015 and 2017, during which five strong geomagnetic storms occurred, were selected from two Japanese ionosonde stations (Kokubunji and Wakkanai) located at the mid-latitude region. The results of the present work do not show a good correlation between the observed and predicted MUF values for F2- laye

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The Sources and Effects of Risks of Forms of Islamic Financing in the Islamic Branches of the Commercial Bank
...Show More Authors

Proved Islamic banks in many countries where they are present, whether Muslim or non-Muslim in the wake of the global financial crisis, it is more efficient, profitable, and stable compared with the conventional banks, so went many of the worlds towards providing Islamic banking through Islamic windows to Besides financial services and products offered by the traditional, or the initiative to enter formulas Islamic finance is fully compliant with the principles and rules of Islamic law and is Brokerage basic function of conventional banks and Islamic alike ) and that means working on the mobilization of savings from surplus units and directed towards the financial units of the fiscal deficit) , which operates commercial banks

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
On Г-n- (Anti ) Generalized Strong Commutativity Preserving Maps for Semiprime Γ-Rings
...Show More Authors

      In this study, we prove that let N be a fixed positive integer and R be a semiprime -ring with extended centroid . Suppose that additive maps  such that  is onto,  satisfy one of the following conditions  belong to Г-N- generalized strong commutativity preserving for short; (Γ-N-GSCP) on R   belong to Г-N-anti-generalized strong commutativity preserving for short; (Γ-N-AGSCP)  Then there exists an element  and  additive maps  such that  is of the form  and   when condition (i) is satisfied, and     when condition (ii) is satisfied   

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More