Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings and modules.
Twisted tape insertion in the smooth plain tube is one of the types of passive methods that are used to enhance heat transfer. Swirl fluid flow inside the tube and related heat transfer characteristics are very complex. ANSYS FLUENT (V 16.1) and ASPEN industrial program are used in analyzing this technique for enhancement heat transfer. A circular plain tube has length L=8534mm and 17 mm inner diameter with a twisted tape of twist ratio of y = (H/D) = (150/17) =8.8 along the plain tube were considered for this study. Eight Reynolds numbers (Re) of 784, 1000, 2000, 3000, 4000, 5000, 6000 and 7000 are used to analyze the response of thermal performance. Crude oil API 28 exit temperature, film heat transfer coefficient, Nus
... Show MoreThe aim of this scientific study is to diagnose the nature of the relationship between academic education in the field of media, communication and media practice. The university offers theoretical and practical lessons to students on the concepts of communication sciences, theories, models, legislations, ethics, and techniques over three years or more. And the diploma in the field of communication and Media Sciences gives students the opportunity to work in the field of journalism and media in the future, this is what many academics and media thinkers in Algeria believe, while another trend sees the exact opposite: The study of information and communication sciences within the university in the form of theoretical lessons cannot contribu
... Show MoreThis study focuses on CFD analysis in the field of the shell and double concentric tube heat exchanger. A commercial CFD package was used to resolve the flow and temperature fields inside the shell and tubes of the heat exchanger used. Simulations by CFD are performed for the single shell and double concentric tube.
This heat exchanger included 16 tubes and 20 baffles. The shell had a length of 1.18 m and its diameter was 220 mm. Solid Works 2014, ANSYS 15.0 software was used to analyze the fields of flow and temperature inside the shell and the tubes. The RNG k-ε model was used and it provided good results. Coarse and fine meshes were investigated, showing that aspect ratio has no significant effect. 14 million
... Show MoreThe public budget is on the same time an art and a science .As an accountable science it seeks balance between public income and public expenditure for an accountable year. And as an accountable art it seeks to achieve economic balance by distributing equitable income in order to reach sustainable development .This is the optimal use of all natural and human resources to address scarcity of natural resources facing the increase need of human resources by spending on education, health, environment, housing, agriculture and industry to achieve social justice for the current generation and future generations. Since the first budget in Iraq on 1921 an accounting budget, is balancing the sections and items has been adopted and since the publi
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThis study is dedicated to one of the most difficult topics in Russian - this is the science of idioms. A feature of the Russian speech application in recent decades has been the effective change in the lexical composition of the Russian language. This article illustrates the semantic, grammatical and stylistic structural characteristics of the linguistic units that appeared in Russian at the end of the 20th century - the beginning of the twenty-first century. This work defines these terms : terminology, linguistic unity, and terms that are used as synonyms. In this research , we will adhere to the conciliatory view of the problem and include not only the terminology in the language units, but also the terminological compositions, saying
... Show MoreThis paper tackles methods of teaching conversation in Russian to students speaking Arabic. It analyses the differences between the two languages, as well as the difficulties and major errors faced by Arabic speakers studying Russian. Particularly, it looks at the difficulty of transforming spoken language. Finally, the paper suggests ways for teaching spoken language and treating the reasons behind making errors.
Аннотация
Данная статья рассматривает методы преподавания говорения на русском языке для носителей арабского яз
... Show MoreThe article states that the Russian verbs of destruction belong to the lexical-semantic group of physical impact. They include verbs with the meaning of “damage” and “destroy”. It is emphasized that each of these groups is relatively independent; the cut line between them is fuzzy and arbitrary. It is postulated that when the object is completely destroyed, then the verb has the meaning of “destruction”, and when the object is partially destroyed, then the verb has the meaning of “damage”. It is this feature that individualizes the meaning of verbs. The study distinguishes between the groups and the nature of the object as- animate / inanimate. The object of the action of the “destruction” can only be inan
... Show MoreSelf-compacted concrete (SCC) considered as a revolution progress in concrete technology due to its ability for flowing through forms, fusion with reinforcement, compact itself by its weight without using vibrators and economic advantages. This research aims to assess the fresh properties of SCC and study their effect on its compressive strength using different grading zones and different fineness modulus (F.M) of fine aggregate. The fineness modulus used in this study was (2.73, 2.82,2.9& 3.12) for different zones of grading (zone I, zone II& marginal zone(between zone I&II)) according to Iraqi standards (I.Q.S No.45/1984).Twelve mixes were prepared, each mix were tested in fresh state with slump, V-Funnel and L-Box tests, t
... Show MoreThe Diwan of Imam Al-Shafi’i acquires great importance, as Al-Shafi’i is an authority in the language, and when I saw that no one had preceded me in exploring its depths, I took my tool and turned my face towards it intending to study the triple verb in it. I stop at these verbs and the student pauses for their morphological forms, looking at the significance of the triple verb more with one letter, two letters, and three letters, and I found that they are many, and such research cannot contain them all, so the choice came to choose the triple verb more with one letter, and the significance of the increase in it, as the increase in The building necessitates an increase in the meaning, and from here the study was limited to the triple
... Show More