Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
Today’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol
... Show MoreRutting has a significant impact on the pavements' performance. Rutting depth is often used as a parameter to assess the quality of pavements. The Asphalt Institute (AI) design method prescribes a maximum allowable rutting depth of 13mm, whereas the AASHTO design method stipulates a critical serviceability index of 2.5 which is equivalent to an average rutting depth of 15mm. In this research, static and repeated compression tests were performed to evaluate the permanent strain based on (1) the relationship between mix properties (asphalt content and type), and (2) testing temperature. The results indicated that the accumulated plastic strain was higher during the repeated load test than that during the static load tests. Notably, temperatur
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Nicotiana tobaccum L (Solanacea) extracts are used as a mollusciede to the snail Bulinus truncatus the intermediate host of urinary Schistosomiasis. LC50 of the extracts to the snail with 24 hour was 3.27 ml/l? 48 hour was 3.33 ml/l? 72 hour was 2.67 ml/l and 96 hour was 2.28ml/l. This study showed the ability to use the leaf extracts in the control of this type of snail.
This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe Hubble telescope is characterized by the accuracy of the image formed in it, as a result of the fact that the surrounding environment is free of optical pollutants. Such as atmospheric gases and dust, in addition to light pollution emanating from industrial and natural light sources on the earth's surface. The Hubble telescope has a relatively large objective lens that provides appropriate light to enter the telescope to get a good image. Because of the nature of astronomical observation, which requires sufficient light intensity emanating from celestial objects (galaxies, stars, planets, etc.). The Hubble telescope is classified as type of the Cassegrain reflecting telescopes, which gives it the advantage of eliminating chromat
... Show MoreDeficiencies in revenue-related accounting standards, including American accounting standards as well as international accounting standards, prompted the issuance of the International Financial Reporting Standard IFRS 15 "Revenue from contracts with customers" as part of the convergence plan between the FASB and the International Accounting Standards Board (IASB) according to the requirements of The joint venture between the two councils, whereby the standard aims to define the basis for reporting useful information to the users of the financial statements about the nature, amount, timing and uncertainty about the revenues and cash flows arising from a contract with the customer, The standard is base
... Show More