Let R be an associative ring with identity and let M be right R-module M is called μ-semi hollow module if every finitely generated submodule of M is μ-small submodule of M The purpose of this paper is to give some properties of μ-semi hollow module. Also, we gives conditions under, which the direct sum of μ-semi hollow modules is μ-semi hollow. An R-module is said has a projective μ-cover if there exists an epimorphism
In this work, we studied the effect of power variation on inductively coupled plasma parameters using numerical simulation. Different values were used for input power (750 W-1500 W), gas temperature 300K, gas pressure (0.02torr), 5 tourns of the copper coil and the plasma was produced at radio frequency (RF) 13.56 MHZ on the coil above the quartz chamber. For the previous purpose, a computer simulation in two dimensions axisymmetric, based on finite element method, was implemented for argon plasma. Based on the results we were able to obtain plasma with a higher density, which was represented by obtaining the plasma parameters (electron density, electric potential, total power, number density of argon ions, el
... Show MoreThe main purpose of the work is to analyse studies of themagnetohydrodynamic “MHD” flow for a fluid of generalized Burgers’ “GB” within an annular pipe submitted under impulsive pressure “IP” gradient. Closed form expressions for the velocity profile, impulsive pressure gradient have been taken by performing the finite Hankel transform “FHT” and Laplace transform “LT” of the successive fraction derivatives. As a result, many figures are planned to exhibit the effects of (different fractional parameters “DFP”, relaxation and retardation times, material parameter for the Burger’s fluid) on the profile of velocity of flows. Furthermore, these figures are compa
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreA Multiple System Biometric System Based on ECG Data
The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
Chronic renal failure (CRF) affects thyroid function in multiple ways, including low circulating thyroid hormone concentration, altered peripheral hormone metabolism, disturbed binding to carrier proteins, possible reduction in tissue thyroid hormone content, and increased iodine store in thyroid glands.The target of study is to find a relationship between chronic renal failure and thyroid function.In addition, we tried to study the effect of CRF on serum creatinine dependent on the level of thyroid hormones (T3 and T4) and thyroid stimulating hormones(TSH). Forty patients with chronic renal failure (20 male, 20 female) were enrolled in this study in addition to forty healthy individual as control gro
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform