Preferred Language
Articles
/
jcois-448
The Imam Al-Zayla'i's Tracks on Imam Mardini   In his Banner Monument
...Show More Authors

The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 05 2018
Journal Name
College Of Education For Pure Science Ibn-a L-haitham, University Of Baghdad
On Some New Topological Spaces
...Show More Authors

Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
On Semi-p-Compact Space1
...Show More Authors

The purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.

View Publication Preview PDF
Crossref
Publication Date
Wed May 08 2013
Journal Name
Iraqi Journal Of Science
On D- Compact Topological Groups
...Show More Authors

In the present paper, we have introduced some new definitions On D- compact topological group and D-L. compact topological group for the compactification in topological spaces and groups, we obtain some results related to D- compact topological group and D-L. compact topological group.

Publication Date
Sat Mar 06 2010
Journal Name
J. Of University Of Anbar For Pure Science
Some Results on Epiform Modules
...Show More Authors

The concept of epiform modules is a dual of the notion of monoform modules. In this work we give some properties of this class of modules. Also, we give conditions under which every hollow (copolyform) module is epiform.

Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Baghdad Science Journal
On pre- Open Regular Spaces
...Show More Authors

In this paper, certain types of regularity of topological spaces have been highlighted, which fall within the study of generalizations of separation axioms. One of the important axioms of separation is what is called regularity, and the spaces that have this property are not few, and the most important of these spaces are Euclidean spaces. Therefore, limiting this important concept to topology is within a narrow framework, which necessitates the use of generalized open sets to obtain more good characteristics and preserve the properties achieved in general topology. Perhaps the reader will realize through the research that our generalization preserved most of the characteristics, the most important of which is the hereditary property. Two t

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sun Oct 03 2010
Journal Name
Baghdad Science Journal
On Semi-p-Compact Space
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
The Scientific Trips Set Out by Scholars of Marrouzzeen and Baihaq Between each Other in the 5th and 6th Hijrah Centuries
...Show More Authors

The present paper aims at finding out the Variance Ratio of Trips Set Out by Scholars of Both Marrouzzeen and Baihaq  .The researcher has come up with conclusion including certain findings ,one of which is that the trip is considered an essential base with high effectiveness since  the old times and has been evolved .This means that the trip has been the main source of  knowledge and sciences from the scholars directly .This had driven the scholars of both Baihaq and Marrouz cities .It has been noticed , though this paper, that the number of the Marrouz scholars who visited was less than those of Baihaq . The researcher has focused on their meetings or conferences and investigated what has been going on in suc

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The factors effecting the discovery of insurance fraud from the perspective of the National Insurance Company's employees
...Show More Authors

This research aims to identify the factors effecting the investigation of insurance fraud from the perspective of the National Insurance Company employees, by analyzing the study variables and make recommendations on how to enhance the company and employees performance, and to achieve the objectives of the study and test hypotheses a questionnaire was designed after referring to the international standards  and the 1969 Iraqi punishment law, and it was answered by 20 employees that were approved for the purposes of  this research and analysis.

      The study found that lack of employee training was a strong factor, while the supervisory staff and operational procedures was a weak one.

G

... Show More
View Publication Preview PDF