We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.
This research addresses the employment of public relations for foreign oil corporate social responsibility programs operating in Iraq. It is a study of the programmes of six petroleum companies operating in Basra Governorate, which were selected for research as the highest production of Iraqi oil, as well as its enjoyment of strategic oil stores in Iraq.It contains the largest oil fields operatedby major international companies. This study aims at a number of objectives, notably the following:1)Recognize the most prominent corporate social responsibility projects and initiatives the companies have introduced to the local public.2)Investigate the extent to which the Iraqi publ
... Show MoreOptimum perforation location selection is an important study to improve well production and hence in the reservoir development process, especially for unconventional high-pressure formations such as the formations under study. Reservoir geomechanics is one of the key factors to find optimal perforation location. This study aims to detect optimum perforation location by investigating the changes in geomechanical properties and wellbore stress for high-pressure formations and studying the difference in different stress type behaviors between normal and abnormal formations. The calculations are achieved by building one-dimensional mechanical earth model using the data of four deep abnormal wells located in Southern Iraqi oil fields. The magni
... Show More(Sb2S3)1-xSnx thin films with different concentrations (0, 0.05 and
0.15) and thicknesses (300,500 and 700nm) have been deposited by
single source vacuum thermal evaporation onto glass substrates at
ambient temperature to study the effect of tin content, thickness and
on its structural morphology, and electrical properties. AFM study
revealed that microstructure parameters such as crystallite size, and
roughness found to depend upon deposition conditions. The DC
conductivity of the vacuum evaporated (Sb2S3)1-x Snx thin films was
measured in the temperature range (293-473)K and was found to
increase on order of magnitude with
The spectral propetties (absorption and fluorescence) of Coumarine-47 laser dye have been studied. This type of laser dye belong the Coumarine family and it has dissolved in chloroform at different concentrations (1x10-5, 5x10-5, and 1x10-4 M) at room temperature. The achieved results have been pointed out to increase in the absorption and fluorescence as the concentration increased which are agreements with Beer – Lambert law. These have been also showed an expansion in the spectral range of absorption and fluorescence with a noticed shift in the direction of longer wavelength (Red-shift) with increasing concentration. The quantum efficiency of the dissolved C47 in chloroform has been computed by using the brevious concentrations
... Show MoreThis work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi
... Show MoreObjective: To Evaluate the Roley of Cytotoxic T-Lymphocytek antigen 4 Polymorphism and soluble immune checkpoint level (PD-1,PDL-1 and CTLA-4 ) in SARS-Cov-2 patients. Methods: Fromt October 2020 to April 2021, the currentk study was conducted in Baghdad-Iraq. Ninety patients with Confirmatory SARS-Cov-2 by PCR were inclusion in the study, and they were seeking treatment at Medical City in Baghdad's Teaching Hospital (BTH). Patients with SARS-Cov-2 were divided into two groups: those with Sever SARS-Cov-2 symptom and those with mild - moderate SARS-Cov-2 symptoms (cross sectional study. Patients with another form of autoimmune illness, malignant, diabetes, under the age of 18 and pregnant women were excluded. Results: Data rega
... Show MoreThe main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More