Preferred Language
Articles
/
bsj-542
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings and modules. .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Theoretical Study of Thermal Cracking For Acenaphthylene Molecule
...Show More Authors

Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic approach in the effectiveness of small and medium Enterprises in Iraq
...Show More Authors

The purpose of this research highlight the achievement of the effectiveness of small and medium enterprises dimensions and conformable to analyze the relationship between business strategies and human resources management strategies , and launched search of a dilemma thought provoking fundamental questions revolve around the search is the lack of appropriate strategies in these enterprises to help them continuity and permanence in business and markets , as these enterprises lack the human resources management strategies appropriate , as well as business strategies that make them withstand the changes in the market environment is changing and volatile . It was to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Pitting Corrosion Behavior of 304 SS and 316 SS Alloys in Aqueous Chloride and Bromide Solutions
...Show More Authors

The importance of the present work falls on the pitting corrosion behavior investigation of 304 SS and 316 SS alloys in 3.5 wt%  of aqueous solution bearing with chloride and bromide anion  at different solutions temperature range starting from (20-50)oC due to the pitting corrosion tremendous effect on the economic, safety and materials loss due to leakage. The impact of solution temperatures on the pitting corrosion resistance at 3.5wt% (NaCl and  NaBr) solutions for the 304 SS and 316 SS has been investigated utilizing the cyclic polarization techniques at the potential range -400 to1000 mV vs. SCE at 40 mV/sec scan rate followed by the surface characterization employing Scanning Electron&nbs

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
The Journal Of Contemporary Issues In Business And Government
The Role of Servant Leadership in Developing Management Information Systems
...Show More Authors

The research aims to test the impact of servant leadership in management information systems, as well as to identify the level of servant leadership practice and management information systems in the Directorate of Communications and Information Systems in the Iraqi Ministry of Interior, in terms of the importance of the research variables to the directorate and the sample community, as the research adopted the exploratory analytical descriptive approach In his achievement, through a survey of the opinions of an intended quota sample of (266) individuals, By adopting the questionnaire as a main tool for data collection that includes (44) items divided into the two research variables, As well as conducting open interviews to identify the pro

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
A Study of Epiphytic and Epipelic Algae in Al-Dora Site/Tigris River in Bagdad Province- Iraq
...Show More Authors

There is a scarcity of data regarding algal flora of Tigris River in the territory of Baghdad. The present study deals with Tigris River in Al-Dora site in Baghdad province from November 2014 to June 2015 in order to shed light on its epiphytic Algae on (Phragmites australis) and epipelic algae. An amount of 183 and 154 species of epiphytic and epipelic algae are identified respectfully. The Bacillariophyceae (diatoms) are the dominant algal group followed by Cyanophyceae and Chlorophyceae. Moreover, 90 species are shared between two groups of algae (epiphytic and epipelic) and identified at the study site. Additionally, the seasonal variations and diversity of algal species are noticed. The highest number of epiphytic algae is 772.05 x 104

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
The use of Some Aliphatic Halorgano antimony Compounds as combustion Retarding agents of Unsaturated Polyester and Epoxy Resins
...Show More Authors

Four antimony compounds were used in this inves as additives to retard combustion of unsaturated polyester and epoxy resins, namely: 1. Tetraethyl ammonium tribromoethylantimonates (additive I). 2. Tetraethyl ammonium chlorodibromoethylantimonates (additive II). 3. Tetraethyl ammonium trichloroethylantimonates (additive III). 4. Tetraethyl ammonium bromodichloroethylantimonates (additive IV). The effects of these additives on flammability of unsaturated polyester and epoxy resins have been studied by using sheets of the resins with weight percentages of (0.5,1.0,1.5,2.0,2.5&3.0%) of the additives in dimensions of (150 X150X3)mm .Three standard test methods were used to measure the flame retardation which are: (ASTM:D -2863), (ASTM:D-635

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 12 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Possibility of applying international AACSB accreditation standards in the faculties of business and Economics- case study in the college of management and Economics-University of Baghdad
...Show More Authors

Attention increased to the topic of academic accreditation by the university as a modern philosophy by which to improve its performance and provide high-quality education. Universities and colleges in general and Iraqi universities and colleges in particular have begun interest in accreditation and desire to get it. So starting from the pursuit of the Administration and Economics College / Baghdad University in obtaining accreditation of Association to Advance Collegiate Schools of Business (AACSB) The research is present which aims to determine the level of application (AACSB) International standards at the College of Administration and Economics / Baghdad University in preparation to get its accreditation in the future. Researc

... Show More
View Publication Preview PDF
Crossref