Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe current research aims to recognize the exploratory and confirmatory factorial structure of the test-wiseness scale on a sample of Hama University students, using the descriptive method. Thus, the sample consists of (472) male and female students from the faculties of the University of Hama. Besides, Abu Hashem’s 50 item test-wiseness scale (2008) has been used. The validity and reliability of the items of the scale have also been verified, and six items have been deleted accordingly. The results of the exploratory factor analysis of the first degree have shown the presence of the following five acceptable factors: (exam preparation, test time management, question paper handling, answer sheet handling, and revision). Moreover,
... Show MoreThe objective of the present study is to determine the effect of Kaolin as a fuel oil additive to minimize the fireside corrosion of superheater boiler tubes of ASTM designation (A213-T22) by increasing the melting point of the formed slag on the outside tubes surface, through the formation of new compounds with protective properties to the metal surface. The study included measuring corrosion rates at different temperatures with and without additive use with various periods of time, through crucible test method and weight loss technique.
A mathematical model represents the relation between corrosion rate and the studied variables, is obtained using statistical regression analysis. Using this model,
... Show MoreThe erythrocyte aggregation is an important physiological phenomenon in the circulation of blood. It is a basic characteristic of normal blood that plays a major role in the cardiovascular system, especially in the microcirculation. This study explained the kinetics of single cells rouleaux formation one- dimensional aggregate and three- dimensional aggregate, during simultaneous, and the effect of hematocrit on the process of aggregation and sedimentation. The present study was done on forty one healthy subjects. Laser light is passed through a well mixed sample of blood and the forward scattered light intensities recorded continuously. The samples were prepared with different hematocrit, (10%, 15%, 20%, and 25%). Increasing
... Show MoreIn this work Study effect of annealing temperature on the Structure
of a-Se and electrical properties of a-Se/c-Si hetrojunction have been
studied.The hetrojunction fabricated by deposition of a-Se film on c-
Si using thermal evaporation.
Electrical properties of a-Se/ c-Si heterojunction include I-V
characteristics, in dark at different annealing temperature and C-V
characteristics are considered in the present work.
C-V characteristics suggested that the fabricated diode was
abrupt type, built in potential determined by extrapolation from
1/C2-V curve. The built - in potential (Vbi) for the Se/ Si System
was found to be increase from 1.21 to 1.62eV with increasing of
annealing temperature