Preferred Language
Articles
/
jih-758
On Max-Modules
...Show More Authors

   In this paper ,we introduce a concept of Max– module as follows: M is called a Max- module if ann N R is a maximal ideal of R, for each non– zero submodule N of M;       In other words, M is a Max– module iff (0) is a *- submodule, where  a proper submodule N of M is called a *- submodule if [ ] : N K R is a maximal ideal of R, for each submodule K contains N properly.       In this paper, some properties and characterizations of max– modules and  *- submodules are given. Also, various basic results a bout Max– modules are considered. Moreover, some relations between max- modules and other types of modules are considered.  
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Stiffeners on Shear Lag in Steel Box Girders
...Show More Authors

This paper studies the effects of stiffeners on shear lag in steel box girders with stiffened flanges. A three-dimensional linear finite element analysis using STAAD.Pro V8i program has been employed to evaluate and determine the actual top flange stress distribution and effective width in steel box girders. The steel plates of the flanges and webs have been modeled by four-node isoparametric shell elements, while the stiffeners have been modeled as beam elements. Different numbers (4, 8, and 15) for the steel stiffeners have been used in this study to establish their effects on the shear lag and longitudinal stresses in the flange. Using stiffeners reduced the magnitude of the top flange longitudinal stresses about 40%, but did

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Effect of gamma irradiation on the TlBa2Ca2Cu3O9-δ superconducting properties
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Effect of sustainable palm fiber on high strength concrete properties
...Show More Authors
Abstract<p>Date palm fiber is one of the common wastes available in the M. E. countries essentially Iraq. The aim of search to investigate the performance and effects of fiber date palm on the mechanical properties of high strength concrete, this fiber was used in three ratio 2, 4 and 6 % by vol. of concrete at ages of (7, 28, 90) days. Results demonstrated improvement in the compressive strength increased 19.2 %, 23.6%, 24.9 % for 2%, 4%, 6% of fiber respectively at age 28 days. Flexural strength increases 47.6%, 66.2%, 93.8% form (2,4,6) % of fiber respectively at age 28 days. Density increase about 0.41%, 0, 61 % 0.69 % for (2,4,6) % of fiber respectively at age 28. Absorption water decrease </p> ... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Adsorption of Methylene Blue on Prepared Charcoal from Molasses Waste
...Show More Authors

Recently, important efforts have been made in an attempt to search for the cheapest and ecofriendly alternatives adsorbents. In the present work, waste molasses from Iraqi date palm (Zahdi) had been used as a provenance to produce charcoal for the removal of methylene blue (MB) dye from water. The optimum prepared charcoal was obtained at 150 C, by increasing temperature to 175 C, the charcoal had almost converted to ash. The obtained charcoal have been inspected for properties using scanning electron microscope (SEM), atomic force microscope (AFM), porosity and surface area. Adsorption data were optimized to Langmuir and Freundlich and adsorption parameters have been evaluated. The thermodynamic parameters like a change

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Employment of Titanium dioxide thin film on NO2 gas sensing
...Show More Authors
Abstract<p>TiO<sub>2</sub> thin films were deposited by Spray Pyrolysis with thickness ((350±25) nm) onto glass substrates at (350°C), and the film was annealed at temperatures (400 and 500)°C. The structural and morphological properties of the thin films (TiO<sub>2</sub>) were investigated by X-ray diffraction, Field emission scanning electron microscopy and atomic force microscope. The gas sensor fabricated by evaporating aluminum electrodes using the annealed TiO<sub>2</sub> thin films as an active material. The sensitivity of the sensors was determined by change the electrical resistance towards NO<sub>2</sub> at different working temperatures (200 </p> ... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bioactivity of Bee Venom on European Foul – Brood Bacteria
...Show More Authors

       Laboratory experiments were carried  out in Technical college AL- Mussiab / Babylon during 2005  to study bioactivity of different concentration from ( aqueous , alcohol and hexane) extracts of bee venom collected from different workers of bees against some bacterial types that cause European Foul – brood Melissococcus plutom , Bacillus alvei and B. letrosporus which had been isolated from infected arched with disease . Two diffusion methods (digging and paper discs) were followed for the extraction of the venom . Results showed that digging diffusion method was more efficient for  test of bacterial inhibition which led to increase the activity of bee venom extract with general a

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Porous Silicon effect on the performance of CdS nanoparticles photodetector
...Show More Authors

Cadmium sulfide photodetector was fabricated. The CdS nano
powder has been prepared by a chemical method and deposited as a
thin film on both silicon and porous p- type silicon substrates by spin
coating technique. Structural, morphological, optical and electrical
properties of the prepared CdS nano powder are studied. The X-ray
analysis shows that the obtained powder is CdS with predominantly
hexagonal phase. The Hall measurements show that the nano powder
is n-type with carrier concentration of about (-5.4×1010) cm-3. The
response time of fabricated detector was measured by illuminating
the sample with visible radiation and its value was 5.25 msec. The
specific detectivity of the fabricated det

... Show More
View Publication Preview PDF
Crossref