Preferred Language
Articles
/
ijs-6728
Soft Bornological Group Acts on Soft Bornological Set
...Show More Authors

        In this paper, we introduce the notation of the soft bornological group to solve the problem of boundedness for the soft group. We combine soft set theory with bornology space to produce a new structure which is called    soft bornological group. So that both the product and inverse maps are soft bounded. As well as, we study the actions of the soft bornological group on the soft bornological sets. The aim soft bornological set is to partition into orbital classes by acting soft bornological group on the soft bornological set. In addition, we explain the centralizer, normalizer, and stabilizer in details. The main important results are to prove that the product of soft bornological groups is soft bornological group and the action for different elements are the same actions.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Globalisation and its Impact on North Korean political Regime
...Show More Authors

Abstract Globalization dominated in the last decade of the twentieth century and the eve of the third millennium over economic,politics,psychology,culture,communications and information sciences,it's a historical phenomenon refer to many important transitions in humanitarian life.It foxes on that state has illusion its historical role in the psychologist,economic and political buldings. Globalization issue and its influence in North Korea put a spotlight on political,economic and cultural situations,the political system resists any change with many limitations on political freedoms,human rights and political multiplicity.Libralism trends and free market are so weaken when it comparing within the bad economic situation of the coun

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study on Solvent Extraction of Mercury Complex With DB18C6
...Show More Authors

 Mercury(II) ion is extracted as ion pair with thiocyanate using DCM .The effects of different parameters affecting the ease of extraction are determined . These parameters are  pH ,Thiocyanate ion concentration ,type and concentration of the counter cation concentration of the reagent , temperature and type of solvents .Other crown ethers (15C5 DB24C , DCH18C6 and  18C6 and cryptand- 222 are investigated as extracting reagents  using slop analysis method UV-visible and IR spectrometry .CHN analysis and melting points determination  are perfored for comlex analysis .All these investigations indicated the formula [k+CE]2[Hg (SCN )4]-2.

View Publication Preview PDF
Publication Date
Sun May 30 2021
Journal Name
Iraqi Journal Of Science
Effect of blue laser on viability of Proteus mirabilis
...Show More Authors

The usage of blue laser has been considered as a therapeutic approach to prohibit the viability of bacterial species, but there is no agreement about optimum parameters to be used. The aim of this project is to study the influence of blue laser (450 nm) on the viability of the gram-negative bacteria  Proteus mirabilis isolated from burn wounds, using different exposure times (i.e. doses) in vitro. Seventy swab samples were collected from burn wounds of patients admitted to the burns unit in AL-Yarmouk teaching hospital in Baghdad, during the period from June to August 2019. The Bacteria were isolated and identified depending on their culture characteristics, biochemical tests, gram staining, and morphology, being f

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Fri Feb 28 2020
Journal Name
Iraqi Journal Of Science
Analytical Study of Earth Tides on Low Orbits Satellites
...Show More Authors

     The main objective of this paper is to calculate the perturbations of tide effect on LEO's satellites . In order to achieve this goal, the changes in the orbital elements which include the semi major axis (a) eccentricity (e) inclination , right ascension of ascending nodes ( ), and fifth element argument of perigee ( ) must be employed. In the absence of perturbations, these element remain constant. The results show that the effect of tidal perturbation on the orbital elements depends on the inclination of the satellite orbit. The variation in the ratio  decreases with increasing the inclination of satellite, while it increases with increasing the time.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Laboratory Investigation on Roller Compaction Technique in Concrete Construction
...Show More Authors

Roller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Pairwise Semi-p-separation Axioms in Bitopological Spaces
...Show More Authors

In this paper, we define a new type of pairwise separation axioms called pairwise semi-p- separation axioms in bitopological spaces, also we study some properties of these spaces and relationships of each one with the ordinary separation axioms in the bitopological spaces.

 

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessment of X-Ray Effects on HF Radio Communications
...Show More Authors
Abstract<p>This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Iris Outer Boundary Localization Based on Leading Edge Technique
...Show More Authors

In recent years, the iris biometric occupies a wide interesting when talking about
biometric based systems, because it is one of the most accurate biometrics to prove
users identities, thus it is providing high security for concerned systems. This
research article is showing up an efficient method to detect the outer boundary of
the iris, using a new form of leading edge detection technique. This technique is
very useful to isolate two regions that have convergent intensity levels in gray scale
images, which represents the main issue of iris isolation, because it is difficult to
find the border that can separate between the lighter gray background (sclera) and
light gray foreground (iris texture). The proposed met

... Show More
View Publication Preview PDF