The concepts of higher Bi- homomorphism and Jordan higher Bi- homomorphism have been introduced and studied the relation between Jordan and ordinary higher Bi- homomorphism also the concepts of Co- higher Bi- homomorphism and Co- Jordan higher Bi- homomorphism introduced and the relation between them in Banach algebra have also been studied.
The urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreEducational of the mind is a weapon to a different knowledges which
benefit in ife and developed the mind in many field and practice him in a
regular form in a right thinking and practice sense on exactly recognizing and
conception things which is senses and regulating the memory and providing
with benefit information which fit to minded of person,the present research
aimed at answering the following two questions:
1-Does the concept of mind differ with age?
2-Does the recognition on function of mind developed with development of
age?
The research population consisted of the children in the primary schools
of Baghdad/center,and the students of the Education for woman
college/Baghdad university for the age
Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show Moren this work, the effect of gamma rays on blood thinning drugs was studied using the drug (Aspirin), where gamma rays were spread with the drug using a radioactive source (Co60), and 15,000 grams of Aspirin were placed in the device (gamma chamber 900). The drug was subjected to different irradiation doses (5 KGy, 10 KGy, 15 KGy) and the amount of absorption of the drug was observed in the gamma for different doses and the study of x-rays. After confirming the absorption of the drug to radiation, the effect of the drug on blood thinning was calculated using the rat model and compared with the same drug and the same dose but without exposing the drug to radiation and comparing all results with the control group. The way drugs absorbed radiati
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis study focused on extracting the outer membrane nanovesicles (OMVs) from Escherichia coli BE2 (EC- OMVs) by ultracentrifugation, and the yield was 2.3mg/ml. This was followed by purification with gel filtration chromatography using Sephadex G-150, which was 2mg/ml. The morphology and size of purified EC-OMVs were confirmed by transmission electron microscopy (TEM) at 40-200 nm. The nature of functional groups in the vesicle vesicle was determined by Fourier transforms infrared spectroscopy (FT-IR) analysis. The antitumor activity of EC-OMVs was conducted in vitro by MTT assay in human ovarian (OV33) cancer cell line at 24,48 and 96hrs. The cytotoxicity test showed high susceptibility to the vesicles in ovarian compared to normal
... Show MoreThis paper studies the effect of mean wind velocity on tall building. Wind velocity, wind profile and wind pressure have been considered as a deterministic phenomenon. Wind velocity has been modelled as a half-sinusoidal wave. Three exposures have been studied B, C, and D. Wind pressure was evaluated by equation that joined wind pressure with mean wind velocity, air density, and drag coefficient.
Variations of dynamic load factor for building tip displacement and building base shear were studied for different building heights, different mode shapes, different terrain exposures, and different aspect ratios of building plan. SAP software, has been used in modelling and dynamic analysis for all case studies.
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show More
