Preferred Language
Articles
/
jih-479
S-Coprime Submodules
...Show More Authors

  In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Shrinkage Estimation for R(s, k) in Case of Exponentiated Pareto Distribution
...Show More Authors

   This paper concerns with deriving and estimating the reliability of the multicomponent system in stress-strength model R(s,k), when the stress and strength are identical independent distribution (iid), follows two parameters Exponentiated Pareto Distribution(EPD) with the unknown shape and known scale parameters. Shrinkage estimation method including Maximum likelihood estimator (MLE), has been considered. Comparisons among the proposed estimators were made depending on simulation based on mean squared error (MSE) criteria.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
...Show More Authors

في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
Awareness of children 's rights from the perspective of parents and educators kindergarten in the city of Baghdad
...Show More Authors

The subject of children's rights in the modern era of the priorities of educators , because the child in the community is the future , which is held by the hope which is the basis for society in the renaissance and progress so quickly communities to prove these rights through its various institutions and issued legislation and held numerous conferences and taking specialists the field of childhood Aatron aspects of this rights and Aasalunha including a benefit for children until tomorrow for the rights of children , psychological and social health and educational . Therefore, the current study focused on the awareness of parents and educators of children's rights as individuals most closely satisfying their needs and rights. The

... Show More
View Publication Preview PDF
Publication Date
Sun May 07 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS: DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS
...Show More Authors

The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Association of Glutathione–S-Transferase (GSTP1) Genetic Polymorphism in Iraqi Patients with Diabetes Mellitus Type2
...Show More Authors

Glutathione S-transferases (GSTs) are enzymes that included, in a more range of detoxifying reactions by conjugation of glutathione, to electrophilic material. Polymorphisms n the genes that responsible of GSTs affect, the function of the GSTs. GSTs play an active role in protection of cell against oxidative stress mechanism. Polymorphisms of GSTP1 at codon 105 amino acids forms GSTP1 important site for bind of hydrophobic electrophiles and the substitution of Ile/Val affect substrate specially catalytic activity of the enzyme and may correlate with reach to different diseases in human like diabetes mellitus type2 disease. Correlation between these polymorphisms and changes in the parameters file of diabetic patients has also bee

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Optimization of Glutathione S-Transferase in the Sera of Young Female Iraqi Patients with Diabetes Mellitus Type1
...Show More Authors

This study was attempted to determine optimum conditions, for Glutathione s-Transferase enzyme, in sera of three groups diabetic patients type1 depending on duration of disease without complications compared with control group. The aim of this study was to find optimum conditions were determined such as (pH, Substrate Concentration, Temperature, Incubation time, Enzyme concentration, and effect of(0.15M)(0.25M) of mono divalent compounds). And to find the kinetics parameters in the three groups of diabetic patients when compared with control. It was found optimum pH(8.5,4.5,2.5,6.5).Temperatures(20cº,40cº,50cº,30cº). Incubation times (7min, 4min, 4min, 5min) substrate concentrations (12µl, 10µl, 5µl, 10µl) enzyme concentra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
President Trump›s media discourse in the US election Study in electronic news sites - CNN ARABIC Model
...Show More Authors

The letter is defined as a message directed by the sender to another party, the future. The aim is to convey, clarify or explain a particular point or subject, and in the form of direct oral communication through speech that contains a set of words and words, The future can discuss the sender directly to exchange ideas with each other, or it may be written and in this case does not require direct interaction between the matchmaker and the recipient. As a result of the different sources and topics of the discourse, and the different types of categories addressed to the speech, and the number, it has been divided into several types.
And schools of discourse analysis emerged in the early eighties of the last century and has spread and ha

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More