Let R be an associative ring with identity and let M be right R-module M is called μ-semi hollow module if every finitely generated submodule of M is μ-small submodule of M The purpose of this paper is to give some properties of μ-semi hollow module. Also, we gives conditions under, which the direct sum of μ-semi hollow modules is μ-semi hollow. An R-module is said has a projective μ-cover if there exists an epimorphism
Objective: Dental caries is a chronic infectious disease that is prevalent worldwide in all age groups. Numerous attempts have been made to develop conservative approaches to halt caries progression and restore enamel defects. This study aimed to investigate the effect of applying grape seed extract and chicken eggshell extract on the microhardness of demineralized enamel in permanent teeth. Methods: Forty-eight sound upper first premolars were used. Following demineralization with the demineralizing solution for 96 hours, they were distributed into four groups consistent with the treatment agent used: group A was treated with casein phosphopeptide amorphous calcium phosphate (as a control group), group B was treated with grape se
... Show MoreRecent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show MoreTitanium dioxide nanoparticles (TiO2 NPs) are generally used in different types of applications such as the industry of plastics, paper industry, paints, toothpaste, cosmetics, sunscreens, and in various lifestyles, because of the vast range of applications and our daily exposure to these nanoparticles and a lack of information on animal and human health this study was designed to reveal dose and time-dependent effects of TiO2-NPs on the thyroid gland and kidney functions in male rats.
For this study 54, Sprague-Dawley albino adult male rats were classified into three main groups each of 18 rats treated for a particular duration (1,2, and 4) weeks respectively. Each group was subdivided i
... Show MoreSuccessfully, theoretical equations were established to study the effect of solvent polarities on the electron current density, fill factor and efficiencies of Tris (8-hydroxy) quinoline aluminum (Alq3)/ ZnO solar cells. Three different solvents studied in this theoretical works, namely 1-propanol, ethanol and acetonitrile. The quantum model of transition energy in donor–acceptor system was used to derive a current formula. After that, it has been used to calculate the fill factor and the efficiency of the solar cell. The calculations indicated that the efficiency of the solar cell is influenced by the polarity of solvents. The best performance was for the solar cell based on acetonitrile as a solvent with electron current density of (5.0
... Show MoreImage contrast enhancement methods have been a topic of interest in digital image processing for various applications like satellite imaging, recognition, medical imaging, and stereo vision. This paper studies the technique for image enhancement utilizing Adaptive Histogram Equalization and Weighted Gamma Correction to cater radiometric condition and illumination variations of stereo image pairs. In the proposed method, the stereo pair images are segmented together with weighted distribution into sub-histograms supported with Histogram Equalization (HE) mapping or gamma correction and guided filtering. The experimental result shows the experimented techniques outperform compare with the original image in ev
... Show MoreIn this research, the rabbits' bones have been fractured, the rabbits were exposed to the cold plasma for five minute times two weeks. The microwave plasma voltage which was used in the search was "175v" and the gas flow was" 2 L" at the room temperature. A Biologic parameters such as alkaline phosphates (ALP), osteocalcin, vitamin D (Vit. D) and calcium (Ca), Triglycerides (TG), Cholesterol (T.chol.), Estradiol and Glucose have studied in its serum. Physiological parameters were measured to prove the effects of plasma on the fracture bone tissue and show the amount of damage and the effect of plasma therapy before and after exposure to plasma.
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreThe influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More