Preferred Language
Articles
/
bsj-4793
On (ɱ,ɳ)-Strongly Fully Stably Banach Algebra Modules Related to an Ideal of Am ×ɳ
...Show More Authors

The aim of this paper is introducing the concept of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal. Some properties of (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal have been studied and another characterizations have been given. The relationship of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal that states,  a B- -module Ӽ is (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal  , if and only if  for any two ɱ-element sub-sets and of Ӽɳ, if , for each j = 1, …, ɱ,  i = 1,…, ɳ  and   implies ɳ( ) ɳ(  have been proved..

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Maximum bite force in relation to maximum mouth opening among primary school children
...Show More Authors

Background: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Nodes In Transport Networks – Research, Data Analysis And Modelling
Suggested Solutions to Reduce Traffic Congestion During Rush Hours in Al-Jadriya Intersection
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2008
Journal Name
Al-kindy College Medical Journal
Left Ventricular Hypertrophy in Diabetic Patients and Its Relation to Other Diabetic Complications
...Show More Authors

Background: left ventricular hypertrophy is independent risk factor for cardiovascular morbidity and mortality. The presence of diabetic complications such as autonomic neuropathy and retinopathy may predict cardiac structural changes in diabetic patients. Objective: To explore the chance of occurrence of left ventricular hypertrophy in diabetic patients and whether it is related to the presence of other diabetic complications. Methods: ninty seven (97) normotensive diabetic patients (57) type II with mean duration of diabetes of (12±6 y) and forty (40) type I with mean duration of (8±6 y) were studied by echocardiography and compared with 41 patients as control. Results: The LVMI was significantly higher in type II diabetics compared

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 18 2025
Journal Name
Sustainable Engineering And Innovation
Using fruit fly and dragonfly optimization algorithms to estimate the Fama-MacBeth model
...Show More Authors

This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Budget Programs and Performance away to enhance the control in government economic units
...Show More Authors

     The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.                               

        Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature  show its importance in strengthening financial and operationl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 21 2022
Journal Name
Azerbaijan Medical Journal
Factors contributed to dehiscent uterine scar in women with previous one cesarean section
...Show More Authors

Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Wireless Communications And Mobile Computing
Corrigendum to “Developing a Video Buffer Framework for Video Streaming in Cellular Networks”
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Harnessing Technological Innovation and Artificial Intelligence in Iraqi Commercial Banks to Achieve Sustainability
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Semi E<sup>h</sup>-b-preinvexity and its applications to optimization problems
...Show More Authors
Abstract<p>In this paper, the class of semi <italic>E</italic> <sup> <italic>h</italic> </sup>-<italic>b</italic>-preinvex and pseudo <italic>E</italic> <sup> <italic>h</italic> </sup>-b-preinvex functions are defined as an extension of <italic>E-B</italic>-preinvex and <italic>h</italic>-preinvex functions. In this extension the functions <italic>E</italic>:ℝ<sup> <italic>n</italic> </sup> → ℝ<sup> </sup></p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref