Preferred Language
Articles
/
ijs-775
On the Grobner Basis of the Toric Ideal for 3 X n- Contingency Tables

In this paper, The Grobner basis of the Toric Ideal for - contingency tables related with the Markov basis B introduced by Hussein S. MH, Abdulrahman H. M in 2018 is found. Also, the Grobner basis is a reduced and universal Grobner basis are shown.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt / Egyptology
THE JUDICAL BASIS FOR THE BRANCHING OUT OF CONSTITUTIONAL RIGHT

The bifurcation of the constitutional rights of one of the techniques used by the constitutional court to expand the scope of the constitutional right to explicit, and access to the fact that guarantees constitutional rights, and establishes the constitutional elimination of this technique on a particular bond is the constitutional terms of reference, and in the light of his discretion in the exercise of the constitutional powers of , and tends at times To the adoption of a broad branching approach, which confers on the constitutional text containing constitutional rights a wider scope than the scope of an explicit right.

View Publication
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
The Legal Basis for Negotiations in International Armed Conflicts

Negotiations are among the best means that countries use to achieve their various objectives in foreign policy, precisely because of the high degree of influence that this tool exerts in this field, and the extent of its link with other peaceful diplomatic means.

On the other hand, negotiations represent the best way to move away from the option of war or perhaps settle it. This is mainly related to the efforts of states to employ this method as a method for dealings among themselves, and thus negotiations represent a supreme value that is indispensable for states, as they represent a clear and universally accepted method of work related to the maintenance of peace and security International as a culture in the relations of state

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Impact of budget on the basis of activities in the implementation of competitive strategiesApplied Study in the General Company for Electrical Industries - Tammuz Laboratory

The Contemporary Business Environment is Surrounded by many quick and continues variable and changes which has an effect on the economic units. These variables and changes like the high competition which need many tools to help them to continue and achieve The critical success. So to achieve this they have many competitive strategies like cost leadership strategy, differentiation strategy and focus strategy.

Budget is regarded one of main tools to execute objectives polices and programs of the economic units, beside show how the economic units had execute the available economic resources.

Activity based on budgeting is regarded one of the modern technique in the m

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Quest for an Ideal Beauty in Toni Morrison's The Bluest Eye


In The Bluest Eye (1970), the American-African writer, Toni Morrison explores how
Western standards of ideal beauty are created and propagated with and among the black
community. The novel not only portrays the lives of those whose dark skinned and Negroid
features blight their lives; it also shows how the standard of white beauty, when imposed on
black youth, can drastically damage one’s self-love and esteem which usually occurs when
beauty goes unrecognized. Morrison in this novel focuses on the damage that the black
women characters suffer through the construction of femininity in a racialised society where
whiteness is used as a standard of beauty.


View Publication Preview PDF
Publication Date
Sat Apr 10 2021
Journal Name
Journal Of Legal Sciences
The legal basis for international cooperation in suppressing the crime of financing terrorism

 The international society  feels the need to  the  placement of  means and  legal measures  and procedures  to fight the terrorism- financing crime   ,  thus  the UN  has issued  the international convention to fight  the financing of terrorism  for the year 1999 and a number of resolutions  undertaking to control  the terrorism funders  in the world,  specially the resolution  1373 for the year  2001  and followed by a number of states . The countries    have placed  legislations  suited with  the conditions of every state,  but all of these countries  agree  to confront  t

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On intuitionistic Fuzzy Asly Ideal of Ring

     In this paper we tend to describe the notions of intuitionistic fuzzy asly ideal of ring indicated by (I. F.ASLY) ideal and, we will explore some properties and connections about this concept.

Crossref
View Publication Preview PDF
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Comparison between Radial Basis Function and Wavelet Basis Functions Neural Networks

      In this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented

View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Planning the main production tables using the correct binary programming method

This research include building mathematical models for aggregating planning and shorting planning by using integer programming technique for planning master production scheduling in order to control on the operating production for manufacturing companies to achieve their objectives of increasing the efficiency of utilizing resources and reduce storage and  improving customers service  through  deliver in the actual dates and reducing delays.

Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
On Semigroup Ideals and Right n-Derivation in 3-Prime Near-Rings

 The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_

... Show More
Scopus Crossref
View Publication Preview PDF