Preferred Language
Articles
/
ijs-4196
N Sequence Prime Ideals
...Show More Authors

    In this paper, the concepts of -sequence prime ideal and -sequence quasi prime ideal are introduced. Some properties of such ideals are investigated. The relations between -sequence prime ideal and each of primary ideal, -prime ideal, quasi prime ideal, strongly irreducible ideal, and closed ideal, are studied. Also, the ideals of a principal ideal domain are classified into quasi prime ideals and -sequence quasi prime ideals.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 10 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Influence of Accelerated Curing on Fiber Reinforced Concrete
...Show More Authors

The adopted accelerated curing methods in the experimental work are 55ºC and 82ºC according to British standard methods. The concrete mix with the characteristics compressive strength of 35MPa is design according to the ACI 211.1, the mix proportion is (1:2.65:3.82) for cement, fine and coarse aggregate, respectively. The concrete reinforced with different volume fraction (0.25, 0.5 and 0.75)% of glass, carbon and polypropylene fibers. The experimental results showed that the accelerated curing method using 82ºC gives a compressive strength higher than 55ºC method for all concrete mixes. In addition, the fiber reinforced concrete with 0.75% gives the maximum compressive strength, flexural and splitting tensile strength for all types of

... Show More
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
On the Direct Product of Intuitionistic Fuzzy Topological d-algebra
...Show More Authors

we applied the direct product concept on the notation of intuitionistic fuzzy semi d-ideals of d-algebra with investigation some theorems, and also, we study the notation of direct product of intuitionistic fuzzy topological d-algebra.

 

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The use of value chain analysis of information in determining the most important the accounting information
...Show More Authors

The use  analysis  value chain such  information in the provision as financial  so information quality meet and satisfy the needs of users such information , particularly investors and lenders   as the identification needs   financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances   theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
W-Closed Submodule and Related Concepts
...Show More Authors

    Let R be a commutative ring with identity, and M be a left untial module. In this paper we introduce and study the concept w-closed submodules, that is stronger form of the concept of closed submodules, where asubmodule K of a module M is called w-closed in M, "if it has no proper weak essential extension in M", that is if there exists a submodule L of M with K is weak essential submodule of L then K=L. Some basic properties, examples of w-closed submodules are investigated, and some relationships between w-closed submodules and other related modules are studied. Furthermore, modules with chain condition on w-closed submodules are studied.   

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
(,)- Strongly Derivations Pairs on Rings
...Show More Authors

        Let R be an associative ring. In this paper we present the definition of (s,t)- Strongly derivation pair and Jordan (s,t)- strongly derivation pair on a ring R, and study the relation between them. Also, we study prime rings, semiprime rings, and rings that have commutator left nonzero divisior with (s,t)- strongly derivation pair, to obtain a (s,t)- derivation. Where s,t: R®R are two mappings of R.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Generalization of Rough Set Theory Using a Finite Number of a Finite d. g.'s
...Show More Authors

This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.

View Publication Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Separation Axioms via Ǐ ­ Semi­ g­ Open Sets
...Show More Authors

   The notions Ǐ­semi­g­closedness and Ǐ­semi­g­openness were used to generalize and introduced new classes of separation axioms in ideal spaces. Many relations among several sorts of these classes are summarized, also.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of Several New Succinimides Linked to Phenyl Azo Benzothiazole or Thiazole Moieties with Expected Biological Activity
...Show More Authors

In the present work, several new cyclic imides (succinimides) linked to benzothiazole or thiazole moieties through phenyl azo group were synthesized. Synthesis of the new imides was performed via multistep synthesis. The first step involved reaction of equimolar amounts of succinic anhydride and p-toluidine producing N-(4-tolyl) succinamic acid (1) which was dehydrated in the second step via treatment with acetic anhydride and anhydrous sodium acetate affording N-(4-tolyl)succinimide (2).
In the third step, substituted-2-aminobenzothiazoles were introduced in diazotization reaction with nitrous acid producing the corresponding diazonium salts and these inturn were introduced directly in coupling reaction with compound (2) affording th

... Show More
View Publication Preview PDF