Let R be an associative ring with identity and let M be right R-module M is called μ-semi hollow module if every finitely generated submodule of M is μ-small submodule of M The purpose of this paper is to give some properties of μ-semi hollow module. Also, we gives conditions under, which the direct sum of μ-semi hollow modules is μ-semi hollow. An R-module is said has a projective μ-cover if there exists an epimorphism
Consider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
Vacuum evaporation technique was used to prepare pure and doped ZnS:Pb thin films at10% atomic weight of Pb element onto glass substrates at room temperature for 200 nm thickness. Effect of doping on a.c electrical properties such as, a.c conductivity, real, and imaginary parts of dielectric constant within frequency range (10 KHz - 10 MHz) are measured. The frequency dependence of a.c conductivity is matched with correlated barrier hoping especially at higher frequency. Effect of doping on behavior of a.c mechanism within temperature range 298-473 K was studied.
This study was conducted in an orchard pomegranate's Department of Horticulture College of Agriculture, University of Baghdad for two seasons 1999-2000 on cultivars pomegranate Salimi and narrators seedless to study the effect spraying Nizant growth in sex ratio of flowers and recipes flowering and winning was selected 27 trees per class 15 years old planted
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreThe purpose of this paper is to depict the effect of adding a hydraulic accumulator to a hydraulic system. The experimental work includes using measuring devices with interface to measure the pressure and the vibration of the system directly by computer so as to show the effect of accumulator graphically for real conditions, also the effects of hydraulic accumulator for different applications
have been tested. A simulation analysis of the hydraulic control system using MATLAB.R2010b to study was made to study the stability of the system depending on the transfer function, to estimate the effect of adding the accumulator on stability of the system. A physical simulation test was made for the hydraulic system using MATLAB to show the ef
This research was based on two pillars. The first is a comparison between of research done and the result of a particular variable of research indebendently in the united state, and second, knowledge and determine the effect of managers practices on the contributions of personnel. The manager and staff are considered to be the most important elements in the organization and all of them have a duty towards the others which governed by the relationship rules of procedure of the ministry researched, on the one hand and the interests of the organization and hence employees , whether executives or employees within management formations that the availability of an acceptable level of good pract
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThe presence of residual antibiotics in water results in the development of antibiotics resistant genes. The available wastewater treatment systems are not capable of removing such antibiotics from sewage. Thus, antibiotics need to be removed before the discharge of wastewater. Adsorption is among the promising techniques for the wastewater treatment to aid the removal of a wide range of organic and inorganic pollutants. The present work is a contribution to the search for an economical method for the removal of low concentrations of amoxicillin (AMX) from water by adsorption on water treatment residue, WTR, taken from a local drinking water facility. The chemical composition and the adsorptive characteristics of the material were first
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreAbstract Study aim: to assess the influence of care burden for children with leukemia on their mothers` psychosocial status. Methodology: A Descriptive study, conducted at two pediatric hospitals in Baghdad city. A purposive sample of (60) mothers was participated in the study after obtaining their consent form. The instrument of the study was used to assess mothers` psychosocial status in addition to their sociodemographic characteristics. The data was processed and statistically analysed by SPSS program version 23. Result: the result of the study showed mothers have (81%) in self esteem, (77%) in psychosocial distress, (80%) for social interaction, and (76%) for social isolation. There were association between mothers` psychosocial status
... Show More