Let R be an associative ring with identity and let M be right R-module M is called μ-semi hollow module if every finitely generated submodule of M is μ-small submodule of M The purpose of this paper is to give some properties of μ-semi hollow module. Also, we gives conditions under, which the direct sum of μ-semi hollow modules is μ-semi hollow. An R-module is said has a projective μ-cover if there exists an epimorphism
Asthma is a chronic respiratory disorder in which immunological and structural cells play a role. The limits of conventional medicines necessitate the development of innovative therapeutic techniques for asthma. In the present study, we investigated the possible protective effect of cinnamic acid (CA) on ovalbumin-induced asthma in a mouse model. Sixty albino male mice BALB/c type weighing (20-30) grams were chosen at random and divided into five groups each one contains 12 animal: Group I: PBS/liquid paraffin control. Group II: asthma model group. Group III: cinnamic acid control group; mice received cinnamic acid (50 mg/kg) in liquid paraffin orally by gavage. Group IV: asthma model / group of (25 mg / kg) cinnamic acid; mice received
... Show MoreIn this research is to study the influence of the aging heat treatment on the pitting corrosion resistance of martensitic stainless steel (MSS), where a number of specimens from martensitic stainless steel were subjected to solution treatment at 1100 oC for one hour followed by water quenching then aging in the temperatures range (500-750) oC for different holding times (1,5,10,15&20) hr. Accelerated chemical corrosion test and immersion chemical corrosion test were performed on samples after heat treatment. The results of the research showed that the pitting corrosion resistance is significantly affected by the aging temperature. Where found that the aging samples at a temperature of 500 °C have the highest ra
... Show MoreAbstract
The current research aims to clarify the role of local policies on the performance of the province of Baghdad, after studies proved practical experience what those policies of the major role and effect on the lives of citizens, as well as alleviate the burden on central government, which make a lot of states give local governments broad powers and her specialty funds for the exercise of its vital role and actor in various joints of local development, research has indentified a problem in a number of questions such as: do you have the policy of the provincial council of local qualified and able to influence the performance of the province? What are the main forces of powerful and implementation of policies at all
... Show MoreVariable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage
... Show More.
Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The
... Show More