In this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.
تشكل سوق الاوراق المالية ركناً اساسياً من اركان هيكل النظام التمويلي في النظم الاقتصادية المعاصرة، لما تقوم به هذه الاسواق من دور مهم في حشد المدخرات المحلية وتوجيهها في قنوات استثمارية تعمل على دعم الاقتصاد القومي وتزيد من معدلات الرفاهية الاقتصادية لافراده، فضلاً عن كونها مرأة للوضع الاقتصادي العام في البلاد.
ونتيجة للروابط القوية بين سوق الاوراق المالية والاقتصاد، عُدّ استقرار ونمو
... Show MoreIn''this"article, we"study",the"concept""of WN"-"2"-''Absorbing'''submodules and WNS''-''2''-''Absorbing"submodules as generalization of "weakly 2-absorbing and weakly semi 2-absorbing submodules respectively. We investigate some of basic properties, examples and characterizations of them. Also, prove, the class of WN-2-Absorbing "submodules is contained in the class of WNS-2-Absorbing "submodules. Moreover, many interesting results about these concepts, were proven.
MRP is a system intended for the batch manufacturing of discrete parts including assemblies and subassemblies that should be stocked to support future manufacturing needs. Due to the useful information provided by MRP it has evolved into a Manufacturing Resources Planning, MRP II, a system that ties the basic MRP system to the other functional areas of the company such as marketing, finance, purchasing, etc. The objective of this research, which was conducted at the State Company for Batteries Manufacturing, is to test the performance of some popular lot-sizing techniques used within MRP II framework. It is hypothesized that the technique which minimizes the total inventory costs does no
... Show MoreThis research has taken to the knowledge of the scope of applying the international specification of (ISO 10015) which is regarded to training by the Iraqi ministry of municipalities and public works ,in order to determine its training quality .By using the checklist made based upon the items of the specification ,after translating the English copy into Arabic ,which takes the indications of training depending on qualitative bases. The results of the analysis emphasized that occurred total average by comparison the evaluation of the training activity in the mentioned ministry with the international specification in all of its main items, which was (%55) ,and totally documented ,which finally refer to the existence of great
... Show MoreInformation Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology t
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, Muhammad and his family
The good and pure and after his companions
God Almighty said: ( ) Do they not contemplate the Qur’an? If it had been from other than God, they would have found in it much discrepancy. God Almighty has made the well-being of people and their lives linked to faith in it. So what is the need of people today to return to the Book of their Lord so that they may return to the right path that God intended for His servants so that they may attain sustenance? Security and the good life. How could it not be, when many of the nations of the world no longer see security or stability because their leaders and politic
... Show MoreFirst: People’s need for advocacy:
Calling for a legal necessity for all people, regardless of their races, colours, tongues, and culture, to explain the truth, spread fear, bring benefits, ward off evil, regulate a person’s relationship with his Lord, and his relationship with creatures, so that he knows his money and what he owes.
All of creation is in dire need of the call to God’s religion with insight due to their inability to reach out to goodness, righteousness, guidance, and success on their own. Man is limited in thinking in this universe, limited in his resolve, unable to know what will improve his affairs in the two worlds. His need for religion is one of the necessities of his life, and one of the comple
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThe research aims mainly to the role of the statement style costs on the basis of activity based on performance (PFABC) to reduce production cost and improve the competitive advantage of economic units and industrial under the modern business environment dominated by a lot of developments and changes rapidly, which necessitates taking them and criticize them to ensure survival and continuity. The research problem is the inability of traditional cost methods of providing useful information to the departments of units to take many administrative decisions, particularly decisions related to the product and calculating the costs of the quality of the sound and the availability of the need and the ability to replace methods capa
... Show More