Preferred Language
Articles
/
jih-2731
Loc-hollow Fuzzy Modules with Related Modules
...Show More Authors

     The concept of a small f- subm was presented in a previous study. This work introduced a concept of a hollow f- module, where a module is said to be hollow fuzzy when every subm of it is a small f- subm. Some new types of hollow modules are provided namely, Loc- hollow f- modules as a strength of the hollow module, where every Loc- hollow f- module is a hollow module, but the converse is not true. Many properties and characterizations of these concepts are proved, also the relationship between all these types is researched. Many important results that explain this relationship are demonstrated also several characterizations and properties related to these concepts are given.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
CURVATURE DUCTILITYOF REINFORCED CONCRETE BEAMSECTIONS STIFFENED WITH STEEL PLATES
...Show More Authors

Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Neurological Perfectionism in Talented Individuals with Disabilities “Case Study”
...Show More Authors

The study aims to identify the neurological perfectionism of talented girls with disabilities and do a case study for one of these girls. The sample of the study consisted of (11) female students at the university level, 5 females with disability and (6) normal female-students. The sample also included (19) secondary school female students in Tabuk region, including 10 students with visual disability and (9) normal students. The case study was limited to one case of mentally superior girls (talented) with kinetic disability. The researcher adopted the descriptive methodology (case study), he used neurological perfectionism scale, Salah Mekhemar interview, Stanford interfacial intelligence scale fifth picture, case study form. The re

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Collective C2 transitions in 32S with higher – energy configurations
...Show More Authors

Collective C2 transitions in 32S are discussed for higher
energy configurations by comparing the calculations of transition
strength B(CJ  )with the experimental data. These configurations
are taken into account through a microscopic theory including
excitations from the core orbits and the model space orbits with nħω
excitations.
Excitations up to n=10 are considered. However n=6 seems to
be large enough for a sufficient convergence. The calculations
include the lowest seven 2+0 states of 32S.

View Publication Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Egocentrism & its Relationship with Academic Adaptation among University students
...Show More Authors

The research aimed to identifying :

  1. Egocentrism of the university students .
  2. Academic adaptation of the university student.
  3. Differences in Egocentrism according to the both variable ( Gender and Specialization ) of the university student.
  4. Differences in academic adaptation according to the both variable ( Gender and Specialization ) of the university student .
  5. The Contribution of academic adaptation to Egocentrism of the university student .

The sample of the research consisted of ( 400 ) students.      
Tow instruments have been us

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Revision of some Biomarkers with Cytokines in Breast Cancer
...Show More Authors

Breast cancer is the most repeatedly detected cancer category and the second reason cause of cancer-linked deaths among women worldwide. Tumor bio-indictor is a term utilized to describe possible indicators for carcinoma diagnosis, development and progression. The goal of this study is to evaluate part of some cytokines and biomarkers for both serum and saliva samples in breast cancer then estimate their potential value in the early diagnosis of breast cancer by doing more researches in saliva, and utilizing saliva instead of blood (serum and plasma) in sample collection from patients. Serum and salivary samples were taken from 72 patients with breast cancer and 45 healthy controls, in order to investigate the following

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 07 2021
Journal Name
Romanian Neurosurgery
Indirect revascularization in an Iraqi child with Moyamoya Disease
...Show More Authors

Background: Moyamoya disease (MMD) is a rare cerebrovascular disease characterized by bilateral stenosis starting at the supraclinoid internal carotid artery (ICA), with the development of a collateral network of vessels. It is an established cause of stroke in the pediatric age group. Despite its increasing prevalence in various parts of the world, it remains largely underrecognized in the Middle East, particularly in Iraq. This is the first case of MMD in an Iraqi patient undergoing surgery. Case description: A 12-year-old boy presents with a 3-months history of progressive behavioural changes. MRI revealed diffuse infarcts of different ages. MRA and CT angiography revealed extensive asymmetrical steno-occlusive changes of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Serum Ferritin Levels for Iraqi Patients with Hashimoto's Thyroiditis
...Show More Authors

Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:

... Show More
View Publication
Scopus (2)
Scopus Crossref