Preferred Language
Articles
/
ijs-5914
Full Transformation Semigroup of A Free Left S-Act on N-Generators
...Show More Authors

          It is well known that the wreath product  is the endmorphism monoid of a free S-act with n-generators. If S is a trivial semigroup then  is isomorphic to . The extension  for  to  where  is an independent algebra has been investigated. In particular, we consider  is to be , where  is a free left S-act of n-generators. The eventual goal of this paper is to show that  is an endomorphism monoid of a free left S-act of n-generators and to prove that  is embedded in the wreath product .

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF NITROGEN FERTILIZERS ON GROWTH AND YIELD TRAITS OF MAIZE: EFFECT OF NITROGEN FERTILIZERS ON GROWTH AND YIELD TRAITS OF MAIZE
...Show More Authors

 

ABSTRACT

A field experiment was carried out in the fields of the college of agricultural engineering sciences, university of Baghdad during the fall season of 2021, in order to find out which of the cultivated genotypes of maize are efficient under nitrogen fertilization. The experiment was applied according to a RCBD (split plot design with three replications). The genotypes of experiment (Baghdad, 5018 and Sarah) and  supplying three levels of nitrogen fertilizer, which are N1 (100 kg/ha),  N2 (200 kg/ha) and N3  (300 kg/ha), the results of the statistical analysis are showed the superiority of the cultivar Sarah in the trait of number of days until 50% silking, chlorophyll

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Mar 08 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
No Mobile Phobia Phenomenon _ A Review
...Show More Authors

The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit

... Show More
View Publication
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Fabricating a new Rheometer for Concrete
...Show More Authors

A new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Multi-Agent Systems: A Review Study
...Show More Authors

Multi-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the chara

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
Neural Networks as a Discriminant Purposes
...Show More Authors

Discriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.

In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.  

 

 

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 12 2019
Journal Name
Journal Of The College Of Education For Women
Divine Beauty from A Psychological Perspective
...Show More Authors

This research which is entitled (Devine Beauty), aims at studying the philosophical and literary extensive visions of Andalusian poets in search of pleasure in the beauty of divine self and its impact on the formation of a philosophical frame of mind. It also attempts to investigate the aesthetic aspects that highlight the prestige and greatness and majesty of that absolute beauty.
The most important conclusion of the reach is the Bany Ahmar poets use the beauty of women and the pleasure of wine as cods to reach divine beauty and get the happiness desired with the reflection of absolute beauty in a clear philosophy and thinking of the kingdom of God Almighty.

View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
A secure Search over Distributed Data
...Show More Authors

In recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Arrhythmia-Induced Cardiomyopathy. A Palestinian Experience
...Show More Authors

A 20 year-old male was admitted with a history of recurrent palpitations from 5 years. Baseline ECG revealed premature ventricular contractions (PVCs) with delta waves. Stress ECG showed short non-sustained Ventricular tachycardia (VT). Echocardiography showed moderate dilation of the left ventricle with mild reduced systolic function and Ejection fraction was estimated to be 42%. Right ventricle was mildly dilated and hypokinetic. Both atria were mildly dilated. The patient referred to CVC for EP study with possible ablation. The ablation of the focus led to complete suppression of the ectopy. Post-procedure ECG and echocardiography showed normalized rhythm and systolic function.

View Publication Preview PDF
Crossref