Preferred Language
Articles
/
ijs-7359
On Truncated of General Family of Baskakov –Type Operators
...Show More Authors

Recently, in 2014 [1] the authors introduced a general family of summation integral Baskakov-type operators ( ) . In this paper, we investigate approximation properties of partial sums for this general family.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
The Product of Automorphic Weighted Composition Operators on Hardy Space H <sup>2</sup>
...Show More Authors
Abstract<p>Let <inline-formula> <tex-math><?CDATA $n\in {\mathbb{N}},{p}_{i}\in {\rm{U}},{\alpha }_{{P}_{i}}(z)=\frac{{p}_{i}-z}{1-{\bar{p}}_{i}z}(z\in {\rm{U}})$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" overflow="scroll"> <mrow> <mi>n</mi> <mo>∈</mo> <mi>ℕ</mi> <mo>,</mo> <msub> <mi>p</mi> <mi>i</mi> </msub></mrow></math></inline-formula></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Study of a Certain Family of Multivalent Functions Associated with Subordination
...Show More Authors

The aim of this paper is to introduce a certain family of new classes of multivalent functions associated with subordination. The various results obtained here for each of these classes include coefficient estimates radius of convexity, distortion and growth theorem.  

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 16 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Clients' Perspective towards Family-centered Care Health Services of Family-provider Partnership
...Show More Authors

Abstract

Objective: The purpose of this study is to investigate the family-centered care health services of family-provider partnership in Baghdad/ Iraq.

Methods: A descriptive cross-sectional study is conducted in Baghdad Province. A cluster samples of 440 clients who review family centered care for the purpose of health services. The instruments underlying the study phenomenon deals with client's socio-demographic characteristics and family centered care questionnaire which include (partnership related to decision-making team, supporting the family as the constant in the child’s life, family-to-family and peer support and supporting transition to adulthood). The relia

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
New Generalizations for Ϻ-Hyponormal Operators
...Show More Authors

     This article contains a new generalizations of Ϻ-hyponormal operators which is namely (Ϻ,θ)-hyponormal operator define on Hilbert space H.  Furthermore, we investigate some properties of this concept such as the product and sum of two (Ϻ, θ)-hyponormal operators, At the end the operator equation  where  ,  has been used for getting several characterization of (Ϻ,θ)-hyponormal operators.  

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Use The moment method to Estimate the Reliability Function Of The Data Of Truncated Skew Normal Distribution
...Show More Authors

The Estimation Of The Reliability Function Depends On The Accuracy Of The Data Used To Estimate The Parameters Of The Probability distribution, and Because Some Data Suffer from a Skew in their Data to Estimate the Parameters and Calculate the Reliability Function in light of the Presence of Some Skew in the Data, there must be a Distribution that has flexibility in dealing with that Data. As in the data of Diyala Company for Electrical Industries, as it was observed that there was a positive twisting in the data collected from the Power and Machinery Department, which required distribution that deals with those data and searches for methods that accommodate this problem and lead to accurate estimates of the reliability function,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
On the Dynamics of One Parameter Family of Functions f_k (x)=kcsc(x)
...Show More Authors

     In this research, we study the dynamics of one parameter family of meromorphic functions . Furthermore, we describe the nature of fixed points of the functions in ,and we explain the numbers of real fixed points depending on the critical point . So, we develop some necessary conditions for the convergence of the sequence when .

View Publication Preview PDF
Scopus (1)
Scopus Crossref