This study aims to answer the following question: Is a student who attaches to the social group strongly affected by social interaction and social status? The population of the study included a group of medical students at the University of Al-Kufa. To collect the required data, a scale of Social Group Attachment consisting of (25) items was administered to a sample of (600) students, (257) male students, and (343) female students. The results revealed that students do not have a high level of attachment to the social group and they have a fear of that. There are no significant differences between the levels of attachment between males and females. There are no significant differences regarding colleges, the four academic levels, and social status.
This study investigates the constructs and related theories that drive social capital in energy sector from the intention perspectives. This research uses theories of 'social support' and 'planned behaviour' alongside satisfaction and perceived value to propose a research model that drives social capital for energy sectors in Malaysia. The model reveals that the Theories of Planned Behaviour (TPB) and Social Support Theory (SST) alongside satisfaction and perceived value factors promote social capital development in energy sectors. Using PLS-SEM to analyse data gathered from energy sector employees in Malaysia, this research demonstrates that social capital is present when there is trust and loyalty among the users and positively effects en
... Show MoreIn this paper, we study the effect of group homomorphism on the chain of level subgroups of fuzzy groups. We prove a necessary and sufficient conditions under which the chains of level subgroups of homomorphic images of an a arbitrary fuzzy group can be obtained from that of the fuzzy groups . Also, we find the chains of level subgroups of homomorphic images and pre-images of arbitrary fuzzy groups
The concept of the order sum graph associated with a finite group based on the order of the group and order of group elements is introduced. Some of the properties and characteristics such as size, chromatic number, domination number, diameter, circumference, independence number, clique number, vertex connectivity, spectra, and Laplacian spectra of the order sum graph are determined. Characterizations of the order sum graph to be complete, perfect, etc. are also obtained.
The set of all (n×n) non-singular matrices over the field F. And this set forms a group under the operation of matrix multiplication. This group is called the general linear group of dimension over the field F, denoted by . The determinant of these matrices is a homomorphism from into F* and the kernel of this homomorphism was the special linear group and denoted by Thus is the subgroup of which contains all matrices of determinant one.
The rationally valued characters of the rational representations are written as a linear combination of the induced characters for the groups discussed in this paper. We find the Artin indicator for this group after studying the rationally valued characters of the rational
... Show MoreThe set of all (n×n) non-singular matrices over the field F this set forms a group under the operation of matrix multiplication. This group is called the general linear group of dimension over the field F, denoted by . The determinant of these matrices is a homomorphism from into F* and the kernel of this homomorphism was the special linear group and denoted by Thus is the subgroup of which contains all matrices of determinant one.
The rational valued characters of the rational representations written as a linear combination of the induced characters for the groups discuss in this paper and find the Artin indicator for this group after study the rational valued characters of the rational representations and the induce
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
The problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in c