Preferred Language
Articles
/
ijs-2758
On Closed Quasi Principally Injective Acts over Monoids

The concept of closed quasi principally injective acts over monoids is introduced ,which signifies a generalization for the quasi principally injective as well as for the closed quasi injective acts. Characterization of this concept is intended to show the behavior of a closed quasi principally injective property. At the same time, some properties of closed quasi principally injective acts are examined in terms of their endomorphism monoid. Also, the characterization of a closed self-principally injective monoid is given in terms of its annihilator. The relationship between the following concepts is also studied; closed quasi principally injective acts over monoids, Hopfian, co Hopfian, and directly finite property. Ultimately, based on the results obtained, the conditions on subacts to inherit a closed quasi principally injective property were shown. Part of this paper was dedicated to studying the relationship between the classes of closed quasi principally injective acts with some generalizations of injectivity. Conclusions and future remarks of this work are given.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Torsion (Torsion Free) Fuzzy Modules Over Fuzzy Integral Domain

The   study   of  torsion  {torsion   free)  fuzzy  modules   over   fuzzy

integtal  domain  as a generalization oftorsion (torsion free) modules.

View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Jan 07 2023
Journal Name
Transportation Infrastructure Geotechnology
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
The Representaion of Algebraic Integers as Sum of Units over the Real Quadratic Fields: REPRESENTAION OF ALGEBRAIC INTEGERS AS SUM OF UNITS OVER THE REAL QUADRATIC FIELDS

In this paper we generalize Jacobsons results by proving that any integer  in   is a square-free integer), belong to . All units of  are generated by the fundamental unit  having the forms

Our generalization build on using the conditions

This leads us to classify the real quadratic fields  into the sets  Jacobsons results shows that  and Sliwa confirm that  and  are the only real quadratic fields in .

Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
The Effect of Mhd on Unsteady Flow of A Second Grade Fluid Film Over an Unsteady Stret Ching Sheet

The aim of this paper is the study of the influence of magnetic field on unsteady
flow of the second-grade fluid with constant viscosity. The equations which
controlled this type of fluid flow are complicated, so finding an analytical solution is
not easy, because it is a system of partial differential equations.We obtained an
expression for the velocity by using homotopy analysis method HAM.
It is found that the equations motion are controlled by many dimensionless
parameter, namely magnetic field parameter M and material constant α,
dimensionless film thickness β and unsteadiness parameter S.We have been studied
the influence of all the physical parameters, that mentioned above on the velocity
field, also a

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 07 2023
Journal Name
Multidisciplinary International Journal
INTEGRATION BETWEEN LANGUAGE AND LITERATURE OVER TEACHING OF FOREIGN LANGUAGES

PDBN Rashid, Multidisciplinary International Journal, 2023

View Publication
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technologyā€¸

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Air Quality Over Baghdad City Using Ground and Aircraft Measurements.

In this paper, the air pollutants concentrations measurements such as Total
Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and
meteorological parameters including temperature (T), relative humidity (RH) and
wind speed & direction were conducted in Baghdad city by several stations
measuring numbered (22) stations located in different regions, and were classified
into (industrial, commercial and residential) stations. The results show that the
concentrations of pollutants (TSP, CO, and CO2) have exceeded the air quality
standards set by World Health Organization (WHO) and Iraqi limitation in the
stations of the Baghdad city. The program (ArcGIS) used to prepare maps of air
pollution in Ba

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Complete Arcs in Projective Plane PG (2,11) Over Galois field

    In this work, we construct complete (K, n)-arcs in the projective plane over Galois field GF (11), where 12 2 ≤ ≤ n  ,by using geometrical method (using the union of some maximum(k,2)- Arcs , we found (12,2)-arc, (19,3)-arc , (29,4)-arc, (38,5)-arc , (47,6)-arc, (58,7)-arc, (68,6)-arc, (81,9)-arc, (96,10)-arc, (109,11)-arc, (133,12)-arc, all of them are complete arc in PG(2, 11) over GF(11).  

View Publication Preview PDF