Preferred Language
Articles
/
whfCXI8BVTCNdQwCUm7Z
Composition effects on formation energies, electronic and vibrational properties of ZnCdS wurtzoid molecules: A DFT study
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 18 2016
Journal Name
International Journal Of Applied Mathematical Research
On common fixed points in generalized Menger spaces
...Show More Authors

R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.

View Publication
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
External audit data on liabilitySocial organizations for profit
...Show More Authors

Givers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.

This  encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.

In this respect the Audit function comes to che

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
The parameters effect on the holographic optical elements
...Show More Authors

In this work we fabrication holographic optical element diffraction grating thickness 40?m and mirror90?m by using dichromated gelatin,to perform that we have to use the Nd-yaG laser doubling frequency of wavelenght (532)nm and its powers of (80)mWatt.we have studyed the thickness and concentration dichromat effect in mirror reflaction ,effect of angle of reconstruction beam in band width and diffraction efficiency ,study effect gelatin hardener of the diffraction efficiency.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Load Effect on Wall Attachment Fluidics Amplifier Performance
...Show More Authors

An experimental work has been conducted on wall attachment fluidics amplifiers, one of them to study the effect of output pressure or load on the amplifier performance. The output load has been simulated as a piston connected to the device output and the piston can be loaded accordingly. The results shows that the output volume flow rate increases as the supply pressure increases under different load and the output pressure remains constant as the supply pressure increases under constant load.

View Publication Preview PDF
Publication Date
Tue Jun 14 2005
Journal Name
Iraqi Journal Of Laser
Bending Effect on the Single Mode Optical Fibers
...Show More Authors

Bending effects on the transmission of optical signal are investigated on a single mode
optical fiber (SMOF) of 10 m length, core radius of 5 μm and optical refractive index difference
0.003. The bending radii (R) were between 0.08 and 0.0015 m. A great decrease in the amplitude is
shown for radii below 0.01 m. Sudden break down occurs for radii less than 0.0015 m. Birefringence
(B) is difficult to measure for long fibers. Meanwhile, B was found by comparing with calibrated
fiber of the same properties but of length of 0.075 m. The results show an increase in propagation
constant (Δβ) and the decrease in beat length (Lb), and show that bending decreases the critical radius
of curvature (Rc) related to B. The chang

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
The Migration Effect on an Eco-toxicant Model
...Show More Authors

This paper proposes and studies an ecotoxicant system with Lotka-Volterra functional response for predation including prey protective region. The equilibrium points and the stability of this model have been investigated analytically both locally and globally. Finally, numerical simulations and graphical representations have been utilized to support our analytical findings

Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication