Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings and modules.
Wisdom in the era before Islam is soo famous and so mature And Wisdom in the age of Islam {the holy quran and AI Hadeeth AI shareef }is dealt with by different meanings that agree with the contexts in which it occurs its contacs One of meanings is wisesaying that occuars in the Halal and Haram .As to the wisdom of the Amawy age ,it was some times absent since it was not dealt with by the great Poets of that age .In the Poetry of AL-FARAZDAK , Wisdom was little and it expressed religious and phsycological meanings because wisdom is amessage that has along –rang .
We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.
Let Ḿ be a unitary R-module and R is a commutative ring with identity. Our aim in this paper to study the concepts T-ABSO fuzzy ideals, T-ABSO fuzzy submodules and T-ABSO quasi primary fuzzy submodules, also we discuss these concepts in the class of multiplication fuzzy modules and relationships between these concepts. Many new basic properties and characterizations on these concepts are given.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
The Immanence in S. Abdu; Saboor Poetry
After this stage in the Bible is problematic and the profane in the poetry of the AL-Sayeghs,
and found that the poems path heading towards obey religious authority because of their wills
and powers, and the insurgency in other areas, as it did not employ shady methods and puns
and intriguing, and I find the reason for this is due to the fear poet focused toward the
influence of political Sergeant, more than effusion direction ascendancy religious sergeant,
was a AL-Sayeghs stop at this border; but went to the formulations problematic diversity in
the cognitive system, he tries it all to critique, as submitted by the history of the conflicts
produced generations of oppression and conflict and tension (what my fault I
Objective: To evaluate male patients complaining of
urethritis clinically according to the isolated organisms.
Method: A total of 100 male patients attending to of
Dermatological and Venereal private clinics for the period
April 2003 to November 2003 were included in the study.
Urethral swab was obtained from each male for culture and
direct immunofluorescence examination was done.
Demographic data was obtained, also.
Results: N. gonorrhoea was the predominate cause of
infection in 22%. A peak of infection was reported in the
second decade of age. Highest rate reported among single
males. A significant association was noticed between
profuse discharge and infection with gonorrhoea.
Conclusion: This
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More