Let R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.
Forty six Iraqi women with PCOS were involved in this study . They were treated with metformin alone and with antioxidant agents (vitamin E or C).It was found that all patients who treated with metformin or with combination of metformin with antioxidant agents showed significant decrease in hirsutism score. The treatment of metformin with antioxidant agents is of great benefit in treatment of hirsutism in PCOS due to that there was no worsening effect after treatment. This may indicate that antioxidant agents may participate in alleviation of hirsutism so it can be said that oxidative stress may play an important role in developing of hirsutism in PCOS.
Background: Computerized tomography scan can show the detailed anatomy of the nose and paranasal sinuses. The sphenoid sinus is a very important corridor for the skull base because of its central position. This sinus has a great range of variation and can put structures around at risk during surgery. This study aims to examine the variation of the sphenoid sinus, and its relation to other structures around it, in this sample of Iraqi patients. Materials and Methods: CT scans of 122 patients, were obtained, and submitted for examination and measurements, during the period between September 2020 and September 2021. Observation of The sphenoid sinus pneumatization pattern, clival extension, Onodi cell, and lateral pneumatization of SS.
... Show MoreThe aim of this research is to employ the roundhouse strategy to study its impact on the students achievement of the 10th grade in physics and their core thinking. After the application of the research experience and gaining data, which was processed statistically using the statistical packages program (SPSS). The results of the researcher revealed the superiority of the students of the experimental group who studied using the roundhouse strategy on the students of the control group who studied the usual method in the achievement test. As results showed that there were statistically significant differences between the average scores of the experimental group and the average scores of the control group students in the core thinking test and
... Show MoreCalcium carbonate is predominantly present in aqueous systems, which is
commonly used in industrial processes. It has inverse solubility characteristics
resulting in the deposition of scale on heat transfer surface. This paper focuses on
developing methods for inhibition of calcium carbonate scale formation in cooling
tower and air cooler system where scaling can cause serious problems, ZnCl 2 and ZnI
2 has been investigated as scale inhibitor on AISI 316 and 304. ZnCl 2 were more
effective than ZnI 2 in both systems, and AISI 316 show more receptivity to the
chlorides salt compared to AISI 304. The inhibitors were more effective in cooling
tower than air cooler system. AISI 316 show more constant inhibition effic
Background: Celiac disease is an autoimmune chronic disease that affects the human’s intestine and subsequently reflects its effect on the entire body health by retardation the absorption and immune mediated complications cause the involvement of oral health. The present study intended to evaluate the impact of the histopathological disease activity upon dental enamel defects and dental caries.
Subjects and methods: Forty celiac-diseased patients aged 7-11 years were collected from 3 different teaching hospitals in Baghdad classified by means of the histopathological activity of the intestinal disease according to modified Marsh-Ros
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe experimental study showed the use of closed cavity wall (the thickness of the cavity 5cm) made a percentage reduction in the cooling load caused by heat gain from the wall by (21.5 %) compared with the conventional wall. also the thermal resistance of the closed cavity was an average (0.2 m2.oC/W).
The experimental results of the study showed that the use of closed cavity wall reduced the average temperature of the inner surface of the wall during the day, and that the reduction was an average (0.45 oC) when compared with the conventional wall , as well as the use of closed cavity wall reduced the temperature difference range of the inner surface of the wall during the day, and that the
... Show MoreThis study was conducted to explore the effects of using ionized water on the productive and physiological performance of Japanese quails (Coturnix japonica). Our study was conducted at a private farm from 20th April, 2016 to 13th July, 2016 (84 d). One hundred 42-day-old Japanese quail chicks were used, divided randomly into 5 groups with 4 replicates. Treatments consisted in a control group (T1 - normal water:), alkaline (T2 - pH 8 and T3 - pH 9), and acidic water (T4 - pH 6 and T5 - pH 5). All birds were fed a balanced diet of energy and protein. The egg production ratio, egg weight, cumulative number of eggs, egg mass, feed conversion ratio, productivity per hen per week, and effects on plasma lipids, uric acid, glucose, calcium, and ph
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More