The aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
The Diyala River is considered the third most important river in Iraq. However, in the recent period, Diyala Governorate has been subject to several floods. This study aims to simulate an efficient labyrinth weir at the flood escape entrance branching from the Diyala River to reach the best entrance through which the flood waves can pass safely. The discharge coefficient was calculated laboratory for five types of trapezoidal side labyrinth weirs with different sidewall angles. Results showed that the coefficient discharge for the trapezoidal labyrinth side weir with an angle of the sidewall is 75ᵒ and has a discharge coefficient greater than the rest of the labyrinth side weirs. The second part of this study is valida
... Show MoreThe present search aims to develop a test for selective attention, cognitive load and thinking mistakes and measuring these concepts among Baghdad university students. To make a comparison between the selective attention, cognitive load, and the mistakes of thinking among students in term of gender. To identify the relationship among the selective attention, cognitive load and the mistakes of thinking of university students. To achieve these purposes, the searcher has developed a test for selective attention, cognitive load, and the mistakes of thinking. Then, these tools were applied to a sample of (200) university students were selected from (21) college. The researcher used t-test of one sample, t-test of two independent
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show Morethere is a need to use the teardown Technique in a various fields and different motives and used often by economic units as a technique to help other techniques for example, used by some economic units for the analysis of other economic units of products in order to work on the development of products and look for opportunities to improve product quality and avoid product errors competitor or reduce its costs, in addition to the services provided by quality control is used ISO 17025 integration with unassembled analysis to adjust the quality of the product by comparing the pieces produced with designed models that are also the product as a whole compared with the original design
... Show MoreDrug consultation is an important part of pharmaceutical care. mobile phone call or text message can serve as an easy, effective, and implementable alternative to improving medication adherence and clinical outcomes by providing the information needed significantly for people with chronic illnesses like diabetes and hypertension particularly during pandemics like COVID-19 pandemic.
This work presents a computer studying to simulate the charging process of a dust grain immersed in plasma with negative ions. The study based on the discrete charging model. The model was developed to take into account the effect of negative ions on charging process of dust grain.
The model was translated to a numerical calculation by using computer programs. The program of model has been written with FORTRAN programming language to calculate the charging process for a dust particle in plasma with negative ion, the time distribution of a dust charge, number charge equilibrium and charging time for different value of ηe (ratio of number density of electron to number density of positive ion).
IA Ali, FK Emran, DF Salloom, Annals of the Romanian Society for Cell Biology, 2021
Detecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
The mutagenic effect of some crucifers widely consumed Lepiduim sativum (Garden cress) and Arugula (Eruca sativa) was studied in comparison to carrot (Daucus carota), using bacterial mutagenic system composed of three bacterial isolates; (Bacillus spp)G3 (Arthrobacter spp)G12, and (Brevibacterium spp)G27 ,. Treatment of isolates with plant extracts led to reduction in survival fraction (Sx)at different levels except that Aurgula extract did not show any inhibitory effect in isolates G12 and G27. Crucifers extracts induced streptomycin resistant mutants in G12 at higher level than G3 , but not in G27. No resistance to rifimpacin was detected in all isolates.