Preferred Language
Articles
/
ijs-627
On µ-lifting Modules
...Show More Authors

Let R be a ring with identity and let M be a left R-module. M is called µ-lifting modulei f for every sub module A of M, There exists a direct summand D of M such that M = D D', for some sub module D' of M such that AD and A D'<<µ D'. The aim of this paper is to introduce properties of µ-lifting modules. Especially, we give characterizations of µ-lifting modules. On the other hand, the notion of amply µ-supplemented iis studied as a generalization of amply supplemented modules, we show that if M is amply µ-supplemented such that every µ-supplement sub module of M is a direct summand, then M is µ-lifting module. Finally, we give some conditions under which the quotient and direct sum of µ-lifting modules is µ-lifting.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Effect of Adding Sand on Clayey Soil Shear Strength
...Show More Authors
Abstract<p>The effect of adding sand on clayey soil shear strength is investigated in this study. Five different percentage of clay-sand mixtures are used; 100% clay with 0% sand termed 100C, 60% clay with 40% sand termed 60C-40S, 30% clay with 70% sand termed 30C-70S, 15% clay with 85% sand termed 15C-85S, and as well as 100% sand termed 100S. The used clay was obtained from Baghdad city in Iraq and classified as CH soil, while the used sand was taken from Al-Khider area from Iraq and classified as SW soil. The initial dry unit weight for all mixtures is 16 kN/m<sup>3</sup>. The results show that the variations of the soil shear strength properties with soil components content changes</p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Single Face Detection on Skin Color and Edge Detection
...Show More Authors

Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 19 2023
Journal Name
Academia Open
Impact of COVID-19 on Dental Students' Psychological Health
...Show More Authors

Academia Open Vol 8 No 2 (2023): December DOI: 10.21070/acopen.8.2023.8087 . Article type: (Medicine)Impact of COVID-19 on Dental Students' Psychological Health Maryam Hameed Alwan, [email protected], (1) Department of Oral Diagnosis, College of Dentistry, Baghdad University, Iraq, Iraq (1) Corresponding author Abstract This study investigates the psychological impact of the COVID-19 pandemic on dental students at Baghdad University College of Dentistry. Conducted between December 2021 and January 2022, this cross-sectional survey aligns with ethical guidelines and the Helsinki Declaration. The study utilized Cochran's equation to determine a sample size of at least 400, ensuring a 95% confidence level with a 5% margin of e

... Show More
View Publication
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Data Hiding in 3D Model Based on Surface Properties
...Show More Authors

    Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Electrical And Electronics Engineering
HF Wave Propagation Prediction Based On Passive Oblique Ionosonde
...Show More Authors

High frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
ON Weak g *sD -Sets And Associative Separation Axioms
...Show More Authors

   In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .
 

View Publication Preview PDF