In thisˑ paperˑ, we apply the notion ofˑ intuitionisticˑ fuzzyˑ n-fold KU-ideal of KU-algebra. Some types of ideals such as intuitionistic fuzzy KU-ideal, intuitionisticˑ fuzzy closed idealˑ and intuitionistic fuzzy n-fold KU-ideal are studied. Also, the relations between intuitionistic fuzzy n-fold KU-ideal and intuitionistic fuzzy KU-ideal are discussed. Furthermore, aˑ fewˑ results of intuitionisticˑ fuzzyˑ n-ˑfold KU-ideals of a KU-algebra underˑ homomorphismˑ are discussed.
After the internal audit as a tool of internal control in any organization, and helps in the evaluation of all internal control activities, as a tool to ensure compliance with the plans and policies to achieve the goals of the institution as much as possible of the efficiency, effectiveness, and should have the Internal Audit full independence and is linked to senior management, and aims to get the credibility and accuracy of information and data, and keep abreast of modern developments.
The practical side includes the preparation of the questionnaire, which included a set of questions that fit the hypothesis of the research, was Tozeiha the research sample consisting of employees of the Internal Audit Department an
... Show MoreThe objective of this paper is to study the stability of SIS epidemic model involving treatment. Two types of such eco-epidemiological models are introduced and analyzed. Boundedness of the system is established. The local and global dynamical behaviors are performed. The conditions of persistence of the models are derived.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
Trigeminal Neuralgia (TN) is one of the most commonly painful cranial neuralgia characterized by paroxysmal attacks as short lasting facial pain along the trigeminal nerve branches. The aim of the present study is to innovate a biochemical relationship between (melatonin, GALNT12 and Zn) and TN and also to examine the biochemical action of tegretol (carbamazepine) as a treatment on the above biochemical parameters. Blood samples were collected from fifty four (54) trigeminal neuralgia patients diagnosed by magnetic radiation image (MRI). Patients were classified into four groups: G3 (40- 70) years composed of (12) diagnosed male (without treatment), G4 (48- 75) years composed of (12) diagnosed female (without treatment), G5 (34- 76)
... Show MoreThe use of symbols is considered an important part of visual expression since ancient civilizations till the present time, and detecting the significance of these symbols is a communication means between the artwork and the recipient. The current study aims to detect the clarification of the concept of symbolic connotations, and to detect their importance in the works of the artist Eugene Delacroix, through description and technical analysis, and trying to monitor the technical aspects of these connotations and using them in forming the artwork; This shows the importance of the study in trying to benefit the scholars in the field of visual arts and the analysis of artworks in particular.
The study used the descriptive analytical appr
This study investigated three aims for the extent of effectiveness of the two systems in educational development of educators. To achieve this, statistical analysis was performed between the two groups that consisted of (26) participants of the electronic teaching method and (38) participants who underwent teaching by the conventional electronic lecture. The results indicated the effectiveness of the “electronic teaching method” and the “electronic lecture method” for learning of the participants in educational development. Also, it indicated the level of equivalence from the aspect of effectiveness of the two methods and at a confidence level of (0.05). This study reached several conclusions, recommendations, and suggestio
... Show MoreGypseous soils are distributed in many regions in the world including Iraq, which cover more than (31%) of the surface area of the country. Existence of these soils, always with high gypsum content, caused difficult problems to the buildings and strategic projects due to dissolution and leaching of the gypsum caused by the action of water flow through soil mass. For the study, the gypseous soil was brought from Bahr Al-Najaf, Al-Najaf Governorate which is located in the middle of Iraq. The model pile was embedded in gypseous soil with 42% gypsum content. Compression axial model pile load tests have been carried out for model pile embedded in gypseous soil at initial degree of saturation of (7%) before and after soil satu
... Show More