Let R be a commutative ring with identity and E be a unitary left R – module .We introduce and study the concept Weak Pseudo – 2 – Absorbing submodules as generalization of weakle – 2 – Absorbing submodules , where a proper submodule A of an R – module E is called Weak Pseudo – 2 – Absorbing if 0 ≠rsx A for r, s R , x E , implies that rx A + soc ( E ) or sx A + soc (E) or rs [ A + soc ( E ) E ]. Many basic properties, char
... Show MoreIndustrial and urban development has resulted in the spread of plastic waste and the increase in the emissions of carbon dioxide resulting from the cement manufacturing process. The current research aims to produce green (environmentally friendly) concrete by using plastic waste as coarse aggregates in different proportions (10% and 20%) and nano silica sand powder as an alternative to cement in different proportions (5% and 10% by weight). The results showed that compressive strength decreased by 12.10% and 19.23% for 10% and 20% plastic waste replacement and increased by 12.89% and 20.39% for 5% and 10% silica sand replacement respectively at 28 days. Flexural strength decreased by 12.95% and 19.64% for 10% and 20% plastic waste r
... Show More<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi
... Show MoreThis paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreUncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreBackground. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between differe
... Show More