The duo module plays an important role in the module theory. Many researchers generalized this concept such as Ozcan AC, Hadi IMA and Ahmed MA. It is known that in a duo module, every submodule is fully invariant. This paper used the class of St-closed submodules to work out a module with the feature that all St-closed submodules are fully invariant. Such a module is called an Stc-duo module. This class of modules contains the duo module properly as well as the CL-duo module which was introduced by Ahmed MA. The behaviour of this new kind of module was considered and studied in detail,for instance, the hereditary property of the St-duo module was investigated, as the result; under certain conditions, every St-closed submodule of an St-duo module is also St-duo. Another characterization of the Stc-duo module was given. Additionally, the relationships of St-duo among some types of modules were investigated and discussed, for example; In the class of semi-extending modules, every weak duo module is anStc-duo module.Also, the authors gave a case in which St-duo, duo, CL-duo and weak duo are equivalent. Furthermore, the St-duo module was used to make the concepts semi-extending and FI-extending equivalent
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
We introduce in this paper the concept of approximaitly semi-prime submodules of unitary left -module over a commutative ring with identity as a generalization of a prime submodules and semi-prime submodules, also generalization of quasi-prime submodules and approximaitly prime submodules. Various basic properties of an approximaitly semi-prime submodules are discussed, where a proper submodule of an -module is called an approximaitly semi-prime submodule of , if whenever , where , and , implies that . Furthermore the behaviors of approximaitly semi-prime submodule in some classes of modules are studied. On the other hand several characterizations of this concept are
... Show MoreIn this work, the fractional damped Burger's equation (FDBE) formula = 0,
Background: Symptoms related to the upper gastro-intestinal tract are very common. Attribution of these symptoms to upper G. I. T.diseases are usually done on clinical bases, which could be confirmed by Esophago Gastro Duodenoscopy (EGD). The use of such tools might increase the diagnosis accuracy for such complaints. The indications for upper G I endoscopy might decrease the negative results of endoscopies.Objective: To follow strict indications for Esophago Gastro Duodenoscopy in order to decrease the negative endoscopy results. Methods: One thousand eight hundred and ninety cases were subjected to EGD from Feb. 1999 to Feb 2009 at Alkindy Teaching Hospital and Abd-Al-Majeed private hospital in Baghdad, Iraq. A special endoscopy unit f
... Show MoreThe digital image with the wavelet tools is increasing nowadays with MATLAB library, by using this method based on invariant moments which are a set of seven moments can be derived from the second and third moments , which can be calculated after converting the image from colored map to gray scale , rescale the image to (512 * 512 ) pixel , dividing the image in to four equal pieces (256 * 256 ) for each piece , then for gray scale image ( 512 * 512 ) and the four pieces (256 * 256 ) calculate wavelet with moment and invariant moment, then store the result with the author ,owner for this image to build data base for the original image to decide the authority of these images by u
... Show MoreLet R be a commutative ring with identity and E be a unitary left R – module .We introduce and study the concept Weak Pseudo – 2 – Absorbing submodules as generalization of weakle – 2 – Absorbing submodules , where a proper submodule A of an R – module E is called Weak Pseudo – 2 – Absorbing if 0 ≠rsx A for r, s R , x E , implies that rx A + soc ( E ) or sx A + soc (E) or rs [ A + soc ( E ) E ]. Many basic properties, char
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show More