Preferred Language
Articles
/
jperc-1126
Awareness of Students at Imam Muhammad bin Saud Islamic University of the Requirements of Married Life in the Light of Social Changes and Methods of Deepening It in Accordance with an Islamic Educational Vision
...Show More Authors

This study aims to identify the level of students’ awareness at Imam Muhammad bin Saud University of the requirements of married life in the light of social changes and suggested methods to deepen this awareness (according to the Islamic educational vision) from their own perspective. In this study, the researcher used the descriptive approach with a survey research method, depending on questionnaires to collect data, which he applied to students of College of Sharia in Imam Muhammad bin Saud Islamic University, as well as, students in the fields of Sociology, Social Work, and Psychology in the College of Social Sciences. The findings of the study revealed that students are aware of the requirements of married life concerning mutual rights. In addition, female students are aware of the rights of both husband and wife. The level of awareness of the aforementioned is moderate; students have also shown a moderate level of awareness about dealing with matrimonial disputes. Female respondents are more aware than male respondents of the requirements of married life, the study has illustrated that there are no differences in awareness between married and unmarried students in this regard. Finally, the respondent’s field of study has no impact on the level of awareness of the requirements of married life. Moreover, this study indicated that the methods suggested deepening the awareness of students of the requirements of married life at Imam Muhammad bin Saud University in the light of social changes (in accordance with Islamic Education) from their own perspective have gained a moderate degree of approval.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Nearly Primary-2-Absorbing Submodules and other Related Concepts
...Show More Authors

Our aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule  of an -module  is called nearly primary-2-absorbing submodule if whenever , for , , ,  implies that either  or  or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Synthesis and Characterizationof Some New Phenolic Schiff Bases Derivatives
...Show More Authors

Starting from bis (4,4'-diamino phenoxy) ethan(1), a variety of phenolicschiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis, some derivatives evaluated by thermal analysis (TGA).

View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Essentially Quasi-Invertible Submodules and Essentially Quasi-Dedekind Modules
...Show More Authors

        Let R be a commutative ring with  identity . In this paper  we study  the concepts of  essentially quasi-invertible submodules and essentially  quasi-Dedekind modules  as  a generalization of  quasi-invertible submodules and quasi-Dedekind  modules  . Among the results that we obtain is the following : M  is an essentially  quasi-Dedekind  module if and only if M is aK-nonsingular module,where a module M is K-nonsingular if, for each  , Kerf ≤e M   implies   f = 0 .

View Publication Preview PDF
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Fast Text Analysis Using Symbol Enumeration and Hashing Methodology
...Show More Authors

This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Pseudo Quasi-2-Absorbing Submodules and Some Related Concepts
...Show More Authors

Let R be a ring and let A be a unitary left R-module. A proper submodule H of an R-module A is called 2-absorbing , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H or rs∈[H:A], and a proper submodule H of an R-module A is called quasi-prime , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H. This led us to introduce the concept pseudo quasi-2-absorbing submodule, as a generalization of both concepts above, where a proper submodule H of an R-module A is called a pseudo quasi-2-absorbing submodule of A, if whenever rsta∈H,where r,s,t∈R,a∈A, implies that either rsa∈H+soc(A) or sta∈H+soc(A) or rta∈H+soc(A), where soc(A) is socal of an

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Minimizing total Completion Time and Maximum late Work Simultaneously
...Show More Authors

In this paper, the problem of scheduling jobs on one machine for a variety multicriteria
are considered to minimize total completion time and maximum late work. A set of n
independent jobs has to be scheduled on a single machine that is continuously available from
time zero onwards and that can handle no more than one job at a time. Job i,(i=1,…,n)
requires processing during a given positive uninterrupted time pi, and its due date d
i.
For the bicriteria problems, some algorithms are proposed to find efficient (Pareto)
solutions for simultaneous case. Also for the multicriteria problem we proposed general
algorithms which gives efficient solutions within the efficient range

View Publication Preview PDF
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Isolation Cellulolytic Fungi from Plants and Animals Wastesin Iraq
...Show More Authors

134 samples of plants and animals wastes were taken from three different regions outside Baghdad and three different regions in Baghdad. 24 cellulolytic isolates fungi AO, C1, TH1, AN1, R1, TV, PG, AF, B1, L1, AP, TH, AP1, AN3, AO2, A, A1, C, F, AO1, C2, F1, CL and AP2 independent were chosen out of 48 selected fungi. The best optimal conditions for growth were 30ºC and pH 7. The isolates were identified and screened according to the colony diameter, biomass and density of spores in addition of capability to produce the hydrolytic enzymes for cellulose.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Semi-T-Hollow Modules and Semi-T-Lifting Modules
...Show More Authors

Let be an associative ring with identity and let be a unitary left -module. Let  be a non-zero submodule of .We say that  is a semi- - hollow module if for every submodule  of  such that  is a semi- - small submodule ( ). In addition, we say that  is a semi- - lifting module if for every submodule  of , there exists a direct summand  of  and  such that  

The main purpose of this work was to develop the properties of these classes of module.

 

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Hybrid Images Compression and Transmitted Using MC-CDMA System
...Show More Authors

In this paper, the combined source coding with Multi Carrier Code Division Multiple Access (MC-CDMA) system is proposed, where the transmission of the compressed image produced from source coding through Additive White Gaussian Noise (AWGN) channel for a single user and multi users. In which the (MC-CDMA) system removes Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI). The hybrid compression system of Discrete Cosine Transform (DCT) and predictive coding (PC) technique are integrated as a source coding. The simulation results indicates that the transmission system of a single user was much better than the transmission system of multi users. When the number of users increased, the Bit Error Rate (BER) increased. For a

... Show More
View Publication Preview PDF