Preferred Language
Articles
/
7xblzYoBVTCNdQwCnaX9
Regularity via semi-generalized open set
...Show More Authors

In this work the concept of semi-generalized regular topological space was introduced and studied via semi generalized open sets. Many properties and results was investigated and studied, also it was shown that the quotient space of semi-generalized regular topological space is not, in general semi-generalizedspace.

Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Is co2 laser Hemorrhoidectomy superior to conventional open Hemorrhoidectomy?
...Show More Authors

Background: Hemorrhoids are one of the most
common surgical conditions .Conventional
haemorrhoidectomy was the traditional operation for
the treatment of hemorrhoids. Other modalities of
treatment had been used as an alternative operations
including CO2 laser haemorrhoidectomy.
Objectives: To determine the outcome of treatment
of hemorrhoids by using CO2 laser
haemorrhoidectomy and its advantages over
conventional surgery
Methods: This is a retrospective comparative
interventional study of 1024 case of third degree
haemorhoids selected out of 1300 case of
hemorrhoids of different degrees, admitted to
ALKINDY, ALYERMOUK teaching hospitals and
ABD ALMAGEED private hospital, from May 1998
to J

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of Legal Sciences
Sale Based on an Open Price – A Comparative Study
...Show More Authors

The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the

... Show More
View Publication
Publication Date
Mon Nov 10 2025
Journal Name
Iraqi Journal Of Science
Magnetohydrodynyamic Flow for a Viscoclastic Fluid with the Generalized Oldroyd-B Model with Fractional Derivative
...Show More Authors

This paper deals with the Magnetohydrodynyamic (Mill)) flow for a viscoclastic fluid of the generalized Oldroyd-B model. The fractional calculus approach is used to establish the constitutive relationship of the non-Newtonian fluid model. Exact analytic solutions for the velocity and shear stress fields in terms of the Fox H-function are obtained by using discrete Laplace transform. The effect of different parameter that controlled the motion and shear stress equations are studied through plotting using the MATHEMATICA-8 software.

View Publication Preview PDF
Publication Date
Mon Apr 01 2013
Journal Name
Journal Of Mathematical Analysis And Applications
Strong duality for generalized monotropic programming in infinite dimensions
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Impulsive Pressure Activity on MHD Flux Generalized Burgers Fluid
...Show More Authors
Abstract<p>The main purpose of the work is to analyse studies of themagnetohydrodynamic “MHD” flow for a fluid of generalized Burgers’ “GB” within an annular pipe submitted under impulsive pressure “IP” gradient. Closed form expressions for the velocity profile, impulsive pressure gradient have been taken by performing the finite Hankel transform “FHT” and Laplace transform “LT” of the successive fraction derivatives. As a result, many figures are planned to exhibit the effects of (different fractional parameters “DFP”, relaxation and retardation times, material parameter for the Burger’s fluid) on the profile of velocity of flows. Furthermore, these figures are compa</p> ... Show More
Scopus (1)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalized Γ-n-Derivations on Prime Γ-Near-Rings
...Show More Authors
Abstract<p>The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and <italic>K</italic> be a nonzero semi-group ideal of <italic>G</italic> which force G to be a commutative ring.</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Nov 12 2014
Journal Name
Wireless Personal Communications
A Multi-objective Disjoint Set Covers for Reliable Lifetime Maximization of Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (19)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Applied Soft Computing
Evolutionary multi-objective set cover problem for task allocation in the Internet of Things
...Show More Authors

Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Applied Soft Computing
Evolutionary multi-objective set cover problem for task allocation in the Internet of Things
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref