Preferred Language
Articles
/
lRYG64cBVTCNdQwCQ3FZ
TOPOLOGY SPECTRUM OF A KU-ALGEBRA
...Show More Authors

The aim of this paper is to study the Zariski topology of a commutative KU-algebra. Firstly, we introduce new concepts of a KU-algebra, such as KU-lattice, involutory ideal and prime ideal and investigate some basic properties of these concepts. Secondly, the notion of the topology spectrum of a commutative KU-algebra is studied and several properties of this topology are provided. Also, we study the continuous map of this topological space.

Publication Date
Tue Nov 15 2022
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
A-mechanical properties of engineered cementitious composite concrete produced from Portland limestone cement
...Show More Authors

Conventional concretes are almost unbending, and even a small amount of strain potential leaves them brittle. This lack of bendability is a major source of strain loss, and it has been the main goal behind the development of bendable concrete, often known with engineered ce ment composites, or ECC. This form of concrete has a lot more flexibility than regular concrete. Micromechanical polymer fibers are used to strengthen ECC. In most cases, ECC uses a 2% amount of thin, separated fibers. As a result, bendable concrete deforms but unlike traditional concrete, it does not crack. This study aims to include this kind of concrete, bendable concrete, which can be used to solve concrete problems. Karasta (CK) and Tasluja (CT) Portland Lime

... Show More
Publication Date
Wed Dec 04 2013
Journal Name
Proceedings Of Nuclei Of Seyfert Galaxies And Qsos - Central Engine & Conditions Of Star Formation — Pos(seyfert 2012)
Are Narrow Line Seyfert 1 galaxies a special class of Active Galactic Nuclei?
...Show More Authors

No. Due to their apparently extreme optical to X-ray properties, Narrow Line Seyfert 1s (NLSy1s) have been considered a special class of active galactic nuclei (AGN). Here, we summarize observational results from different groups to conclude that none of the characteristics that are typically used to define the NLSy1s as a distinct group – from the, nowadays called, Broad Line Seyfert 1s (BLSy1s) – is unique, nor ubiquitous of these particular sources, but shared by the whole Type 1 AGN. Historically, the NLSy1s have been distinguished from the BLSy1s by the narrow width of the broad Hb emission line. The upper limit on the full width at half maximum of this line is 2000kms−1 for NLSy1s, while in BLSy1s it can be of several thousands

... Show More
View Publication
Crossref
Publication Date
Mon Sep 14 2015
Journal Name
Day 2 Tue, September 15, 2015
Modeling and History Matching of a Fractured Reservoir in an Iraqi Oil Field
...Show More Authors
Abstract<p>In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jun 28 2017
Journal Name
Proceedings Of The 2017 Acm Conference On Innovation And Technology In Computer Science Education
Media Literacy as a By-Product of Collaborative Video Production by CS Students
...Show More Authors

Understanding, promoting, and teaching media literacy is an important societal challenge. STEM educators are increasingly looking to incorporate 21st century skills such as media literacy into core subject education. In this paper we investigate how undergraduate Computer Science (CS) students can learn media literacy as a by-product of collaborative video tutorial production. The paper presents a study of 34 third-year CS undergraduates who, as part of their learning, were each asked to produce three video tutorials on Raspberry Pi programming, using a collaborative video production tool for mobile phones (Bootlegger). We provide results of both quantitative and qualitative analysis of the production process and resulting video tutorials,

... Show More
View Publication
Scopus (19)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Proceeding Of The 1st International Conference On Recent Trends Of Engineering Sciences And Sustainability
Design of a Fractional Order Sliding Mode Controller for Twin Rotor Aerodynamic System
...Show More Authors

This paper proposes a new structure for a Fractional Order Sliding Mode Controller (FOSMC) to control a Twin Rotor Aerodynamic System (TRAS). The new structure is composed by defining two 3-dimensional sliding mode surfaces for the TRAS model and introducing fractional order derivative integral in the state variables as well as in the control action. The parameters of the controller are determined so as to minimize the Integral of Time multiplied by Absolute Error (ITAE) performance index. Through comparison, this controller outperforms its integer counterpart in many specifications, such as reducing the delay time, rise time, percentage overshoot, settling time, time to reach the sliding surface, and amplitude of chattering in control inpu

... Show More
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
The Greatness of God in Creating the Hoopoe Bird - A Miracle Study - Explanatory
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon the best of the messengers, Muhammad, and all his family and companions. And after:
For when I had the pleasure of looking at the chapters of the Noble Qur’an, and its evident signs, my view fell on one of its brightest verses, and it is the Almighty saying: ﭽﯜ ﯝ ﯞ ﯟ ﯠ ﯡ ﯢ ﯣ ﯤ ﯥ ﯦ ﯧ ﯨﭼ (). The tag: (God’s Greatness in Creating a Hoopoe). The research methodology required that I divide it into four sections:
The first topic: an overview of birds.
The second topic: the characteristics and characteristics of hoopoe.
The third topic: the logic of the bird.
The fourth topic: Praise the bird.
This has relied in my research on

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Education For Health
Determinants of social accountability for medical schools in Iraq: A qualitative case study
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref