Preferred Language
Articles
/
bsj-1099
Composition operator induced by ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1
...Show More Authors

We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 15 2017
Journal Name
Journal Of Immunology
The Effect of Inhibitory Signals on the Priming of Drug Hapten–Specific T Cells That Express Distinct Vβ Receptors
...Show More Authors
Abstract<p>Drug hypersensitivity involves the activation of T cells in an HLA allele–restricted manner. Because the majority of individuals who carry HLA risk alleles do not develop hypersensitivity, other parameters must control development of the drug-specific T cell response. Thus, we have used a T cell–priming assay and nitroso sulfamethoxazole (SMX-NO) as a model Ag to investigate the activation of specific TCR Vβ subtypes, the impact of programmed death -1 (PD-1), CTL-associated protein 4 (CTLA4), and T cell Ig and mucin domain protein-3 (TIM-3) coinhibitory signaling on activation of naive and memory T cells, and the ability of regulatory T cells (Tregs) to prevent responses. An expa</p> ... Show More
View Publication
Crossref (40)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jun 06 2013
Journal Name
Advances In Physics Theories And Applications
Adsorption study of Symmetrical schiff base ligand 4,4 -[hydrazine -1,2- diylidenebis ( methan-1-yl-1-ylidene) bis ( 2-methoxyphenol)] on Granulated Initiated calcined Iraqi …
...Show More Authors

Publication Date
Tue Aug 02 2022
Journal Name
Ijhs
The association between polymorphism of TCF7L2 gene rs12255372 G/T and type 2 diabetes mellitus in Iraqi women suffering from menopause
...Show More Authors

Type 2 diabetes mellitus (T2DM) became the most prevalent health problem. Almost half of the world's people are ignorant that have diabetes. Menopause occurs as an important alteration in women through which take place the change in sex hormones, distribution in fat،s body, and metabolism, altogether which participate in the metabolism disease such as type 2 diabetes mellitus. Several studies have appeared the association between the TCF7L2 gene and different diseases like type 2 diabetes mellitus (T2DM). This study aimed to detect the relation of the genetic variation polymorphism for the TCF7L2 gene (rs12255372 G/T) in Iraqi women menopausal with T2DM. The outcomes indicated the increased levels of biochemical characteristics including H

... Show More
Publication Date
Fri Sep 01 2023
Journal Name
Asian Pacific Journal Of Cancer Prevention
Development of a T-ARMS-PCR Assay for Detecting Genetic Polymorphism in the Catalase (rs7943316) Gene in the Iraqi Population with Breast Cancer
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Synthesis of Six and Seven-membered Heterocyclic Molecules Containing an Adamantyl Fragment and an X-ray Crystal Structure of (E)-N-(adamantan-1-yl)-1-(3-nitrophenyl)methanimine
...Show More Authors

       Our work included a synthesis of three new imine derivatives—1,3-thiazinan-4-one, 1,3-oxazinan-6-one and 1,3-oxazepin-4,7-dione—which contained an adamantyl fragment. These were produced via the condensation of the Schiff`s base (E)-N-(adamantan-1-yl)-1-(3-aryl)methanimine with 3-mercaptopropanoic acid; 3-chloropropanoic acid; and maleic, citraconic anhydride, respectively. These new imines were prepared via the condensation of adamantan-1-ylamine and 3-nitro-, 3-bromobenzaldehyde in n-BuOH. We obtained a good yield of products. FTIR, 1H NMR spectroscopy and C.H.N.S analysis were used to diagnostic the products. The molecular structure of (E)-N-(adamantan-1-yl

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 02 2023
Journal Name
Pakistan Heart Jornal
The Effect of the Strategy of Differentiated Education According to the Auditory Learning Style by Using Assistance in Learning the Back Kick (T-Chagi) for the Young Players of …
...Show More Authors

Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
CALCULATION BIASES FOR COEFFICIENTS AND SCALE PARAMETER FOR LINEAR (TYPE 1) EXTREME VALUE REGRESSION MODEL FOR LARGEST VALUES
...Show More Authors

Abstract

Characterized by the Ordinary Least Squares (OLS) on Maximum Likelihood for the greatest possible way that the exact moments are known , which means that it can be found, while the other method they are unknown, but approximations to their biases correct to 0(n-1) can be obtained by standard methods. In our research expressions for approximations to the biases of the ML estimators (the regression coefficients and scale parameter) for linear (type 1) Extreme Value Regression Model for Largest Values are presented by using the advanced approach depends on finding the first derivative, second and third.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
BIOLOGICAL ASPECTS AND PREDATORY EFFICIENY OF PREDATOR Chilocorus bipustulatus (L.) COLEOPTERA :COCCINELLIDAE ON DATE PALM SCALE Parlatoria blanchardi (T.) DIASPIDIDAE: HOMOPTERA UNDER LABORATORY CONDITIONS.: BIOLOGICAL ASPECTS AND PREDATORY EFFICIENY OF PREDATOR Chilocorus bipustulatus (L.) COLEOPTERA :COCCINELLIDAE ON DATE PALM SCALE Parlatoria blanchardi (T.) DIASPIDIDAE: HOMOPTERA UNDER LABORATORY CONDITIONS.
...Show More Authors

Laboratory studies were conducted at the biological control unit, college of Agriculture, University of Baghdad to evaluate some biological aspects of the predator Chilocorus bipustulatus (Coleoptera: Coccinellidae), which is considered one of the most important predators on many insect pests, especially the scale insect, Parlatoria blanchardi, (Homoptera: Diaspididae) on date palms. The results showed that biological parameters of the predator were varied according to different degree of temperature. Egg incubation period was significantly different and reached to 7.5 and 5.44 day at 25 and 30°C respectively, Fertility was the same 100% at both temperature degrees. Larval growth periods were 17.41 and 16.12 day as well as the mortality

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 14 2017
Journal Name
Indian Journal Of Clinical Biochemistry
Visfatin, PON-1 Levels in Iraqi Hyperthyroidism Patient’s with Dyslipidemia
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref