Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Background: Tap waters play an important role in fulfilling the people needs for drinking and domestic purposes. Contaminate the tap water with different pollutants has become an issue of great concern for 90% of people who are depended on the tap water as the main source of drinking. Pollutants can make their way easily into the delivering pipes which suffer from the leaking resulting in decreasing the quality of water. Objective: Therefore, assess the water quality for drinking purpose by calculating the water quality index is an important tool to ascertain whether the water is suitable for human consumption or not. Methods: In the present work, the water quality of the Al-Salam, western region of Baghdad city, Iraq was investigated for 7
... Show MorePurpose: the purpose of this study is to investigate how managers working for the General Authority for Irrigation and Reclamation Projects react to the impact of Emotional Intelligence (EI) on their performance. Theoretical framework: The current study includes an intellectual framework on two variables, namely EI and Manager Performance (MP), because it is essential to investigate the relationship between these two variables and the impact of EI on MP. Design/methodology/approach: The research problem is that a manager's capacity to make wise decisions about their work or interactions with subordinates is diminished when they have inadequate EI. The questionnaire is used as a tool for gathering data for the study, and the st
... Show MoreThis study intends to examine the content of photo coverage related to the Gulf Cup (Gulf 25) as presented by Iraqi photojournalists on Instagram between 02/01/2023 and 27/01/2023. Utilizing content analysis, the two researchers employed the survey method to evaluate 674 digital photos posted by seven photojournalists specializing in this sporting event, which concluded with the Iraqi team's victory in the city of Basra.
Key findings from the study include:
1. The Category "Photos from the Gulf Cup matches" predominated, accounting for 291 instances or 42.794% of the total.
2. Photojournalists exhibited a keen interest in capturing images of attending fans and documenting celebrations surrounding th
This research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More