Preferred Language
Articles
/
bsj-1021
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Biochemical & Cellular Archives
A COMPARATIVE STUDY ON SOME BIOCHEMICAL PARAMETERS IN INFERTILE PATIENTS.
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Simulation of a Self-Balancing Platform on the Mobile Car
...Show More Authors

        In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-derivative (PID) co

... Show More
Preview PDF
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
A Survey on Linguistic Interpretation of Facial Expressions and Technologies
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
A prospective study on sexual deviation deployed in Baghdad crimes
...Show More Authors

The current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A reflection of increased financing Equity on returns commons stocks
...Show More Authors

The research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.

This research has included some of the theoretical concepts to each of the Equity

... Show More
View Publication Preview PDF
Crossref