Preferred Language
Articles
/
jcoeduw-1561
News of Zubarah Family- Unionists in Nishapur and their Scientific Contributions in the two Centuries (4-6 AH/10-12 AD)
...Show More Authors

This research is concerned with qualitatively studying the history of an ancient family, one of the most prominent noble, Alawite families, that assumed the position of the Student Union for the Alawite Supervision in the city of Nishapur in Khorasan during the centries (4-6 H./ 10-12 A.H.). Thus, the research aims to investgate the historical news, and the outstanding Zubarah figures who experience the supereme the religious, historical and scientific position in Khorasan generally and Nishapur particularily. It further aims at arriving at the true meaning of the name Zubarah, and to whom it was called, and the extent of this family’s affiliation to the noble Alawi House, and how they moved to live and settle in the cities of the East, including Tabaristan and Abe, then Nishapur, and the establishment of the Alawi and student union to manage the affairs of the honorable gentlemen, take care of them to preserve lineage from confusion, and to look into religious, social and scientific affairs. Thus, the importance of the research lies in knowing everything related to the Zubarah family and what they presented during their presence in the position of the student union in the East in the service of the Prophet and the upper house. The research is like reviving a mention of the glories of this family with a pioneering role in Khorasan, especially the cities of Nishapur and Bayhaq. The research ends with a set of conclusions, such as: the name of Zubarah family goes back to its elder grandfather, Mohammad Al-Akbar, nicknamed Zubarah. This is because when he got angery on right things, his voice got higher and his face got redder, like a lion when he roars.  Their affinity goes back to Al-Husseini Alawi House. Zubarah family had many followers in Nishapur and Bayhaq, who had a religious and social role and distinguished scientific contributions in various sciences and knowledge.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semimaximal Submodules
...Show More Authors

     Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if

 the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are  introduced and given some  properties .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Assessment of ISNAG fluorimeter (Total fluorescence measurements at+ 90° & - 90° using four solar cell on each side for 100mm distance at 2mm path length) with well-known fluorescent molecules via CFIA
...Show More Authors

Two well-known fluorescent molecules: fluorescein sodium salt (FSS) and 2,7-dichloro fluorescein (DCF) were tried to prove the efficiency, trustability and repeatability of ISNAG fluorimeter by using discrete and continuous flow injection analysis modes.A linear range of 0.002-1 mmol/L for FSS and 0.003-0.7 mmol/L was for DCF, with LOD 0.0018 mmol/L and 0.002 mmol/L for FSS and DCF respectively, were obtained for discrete mode of analysis. While the continuous mode gave a linear range of 0.002-0.7 mmol/L and 0.003-0.5 mmol/L for FSS and DCF respectively, the LOD were 0.0016mmol/L and 0.0018 mmol/L for FSS and DCF respectively. The results were compared with classical method at variable λex for both fluorescent molecules at 95

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes.

View Publication Preview PDF
Scopus (1)
Scopus Crossref