Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
A Multiple System Biometric System Based on ECG Data
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
ZnS thin films were grown onto glass substrates by flash evaporation technique, the effects of ? – rays on the optical constants of ZnS these films were studied. It was found that ? – rays affected all the parameters under investigation.
Conventional flexible pavements are released to different types of failure in the initial phases of their service life due to high traffic density, high speeds, heavy loads, and harsh climates. To eliminate pavement damage and failure early, the present search investigates the impact of adding glass, steel, and basalt fibers in the asphalt mixtures. Also, the study evaluates these materials characteristics compared to the mixtures without fibers. The Marshall test and tensile strength ratio test (TSR) were utilized to evaluate the asphalt mixture's performance. A set of specimens were produced by incorporating glass fiber (GF), steel fiber (SF), and basalt fiber (BF) at (0.10%, 0.15%, 0.20%), (0.25%, 0.35%, 0.45%), and (0.15%, 0.35%
... Show MoreThis paper is illustrates the sufficient conditions of the uniformly asymptotically stable and the bounded of the zero solution of fifth order nonlinear differential equation with a variable delay τ(t)
This work aimed to use effective, low-cost, available, and natural adsorbents like eggshells for removal of hazardous organic dye result from widely number of industries and study the influence of different eggshell particle size (75, 150) Mm. The adsorbent was characterized by SEM, EDX, BET and FTIR . The initial pH of dye solutions varying from 4 to 10 , the initial concentrations of methyl violet (MV) 2B range (20-80) mg/L, dosage range (0.5-10) g, contact time (30-180) min, and particles size of the adsorbent (75, 150) Mm were selected to be studied. Two adsorption isotherms models have been used to fit the experimental data. Langmuir and Freunlich models were found to more represent the experiments with high
... Show MoreInformation and Communication Technology revolution has led to the emergence of electronic payment systems and their means And that the replacement of these modern means replace the traditional means (legal money) issued by the Central Bank has influenced the performance of monetary policy, especially that monetary policy is one of the most important policies used to achieve economic stability , The aim of the research is To know the impact of electronic payment systems on the tools of monetary policy as these means, such as cards and electronic money issued by credit institutions and companies, that is, the Central Bank is not responsible for issuance and spread And the lack of regulation by the Central Bank will lea
... Show More