Let R be an associative ring with identity and let M be right R-module M is called μ-semi hollow module if every finitely generated submodule of M is μ-small submodule of M The purpose of this paper is to give some properties of μ-semi hollow module. Also, we gives conditions under, which the direct sum of μ-semi hollow modules is μ-semi hollow. An R-module is said has a projective μ-cover if there exists an epimorphism
The main purpose of this work is to introduce the concept of higher N-derivation and study this concept into 2-torsion free prime ring we proved that:Let R be a prime ring of char. 2, U be a Jordan ideal of R and be a higher N-derivation of R, then , for all u U , r R , n N .
Objectives: study the relation between the effect of time (long time duration) with high concentration of iodine
and study its effect on the activity of the thyroid gland (homonal and histological changes).
Methodology: An experimental study was done on (30) albino rats (8 weeks of age) to know the effect of high
concentration of iodine on the activity of the thyroid gland aiormonal and histological changes) related with
time. The study last for six months for the period of I/2/2007 to 31/7/2007, the experiment was carried out in the
research lab. of pathology deparment, College of Medicine, University of Baghdad.
Results: The study shows changes in homonal levels of thyroid hormones (T3 & T4) and also histological<
Background:
previous reports suggested a connection between hyperlipidemia and neuropathy
Raw satellite images are considered high in resolution, especially multispectral images captured by remote sensing satellites. Hence, choosing the suitable compression technique for such images should be carefully considered, especially on-board small satellites, due to the limited resources. This paper presents an overview and classification of the major and state-of-the-art compression techniques utilized in most space missions launched during the last few decades, such as the Discrete Cosine Transform (DCT) and the Discrete Wavelet Transform (DWT)-based compression techniques. The pros and cons of the onboard compression methods are presented, giving their specifications and showing the differences among them to provide uni
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreObjectives: study the relation between the effect of time (long time duration) with high concentration of iodine
and study its effect on the activity of the thyroid gland (hormonal and histological changes).
Methodology: An experimental study was done on (30) albino rats (8 weeks of age) to know the effect of high
concentration of iodine on the activity of the thyroid gland (hormonal and histological changes) related with
time. The study last for six months for the period of 1/2/2007 to 31/7/2007, the experiment was carried out in the
research lab. of pathology department, College of Medicine, University of Baghdad.
Results: The study shows changes in hormonal levels of thyroid hormones (T3 & T4) and also histologic
Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show More