HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020
This paper introduces the concept of fuzzy σ-ring as a generalization of fuzzy σ-algebra and basic properties; examples of this concept have been given. As the first result, it has been proved that every σ-algebra over a fuzzy set x* is a fuzzy σ-ring-over a fuzzy set x* and construct their converse by example. Furthermore, the fuzzy ring concept has been studied to generalize fuzzy algebra and its relation. Investigating that the concept of fuzzy σ-Ring is a stronger form of a fuzzy ring that is every fuzzy σ-Ring over a fuzzy set x* is a fuzzy ring over a fuzzy set x* and construct their converse by example. In addition, the idea of the smallest, as an important property in the study of real analysis, is studied
... Show MoreOur aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule of an -module is called nearly primary-2-absorbing submodule if whenever , for , , , implies that either or or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.
Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for
... Show MoreThe field of identification of similarity was considered a subject of research strongly recommended in the areas of semantic web, artificial intelligence and linguistic literature. In this paper a new similarity measure is proposed based on the Wu and Palmer measure. This measure is applied on the domain of the pedagogical ontology. Results obtained showed that the new measure gives better relevance of the similarity values compared to the approach of Wu and Palmer and it appears that the proposed measure is advantageous because obtained results showed that it is faster and capable of obtaining results to concepts not located in the same path.
Excerption and inclusion are two terms in Arabic rhetoric. The excerption is defined as a taking a part of text from Holly Quran or Hadith and put it in a poem, verse line, or put it in a prose text. But the linguistics expand the concept of this term to include taking from another sciences and knowledge, like Grammar, Philology, and Prosody.
Inclusion is defined as taking a verse line or part of verse line from another poet to put it in a new poem, it is necessary that the poet who take the text should declare it, and if he hides it, it will be plagiarism.
This search is use these two terms in architecture, we have now new two terms in architecture, first one; architectural excerption, it means the designer takes a part of religio