Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Enhancing fatigue resistance in asphalt binders and mixtures is crucial for prolonging pavement lifespan and improving road performance. Recent advancements in nanotechnology have introduced various nanomaterials such as alumina (NA), carbon nanotubes (CNTs), and silica (NS) as potential asphalt modifiers. These materials possess unique properties that address challenges related to asphalt fatigue. However, their effectiveness depends on proper dispersion and mixing techniques. This review examines the mixing methods used for each nanomaterial to ensure uniform distribution within the asphalt matrix and maximize performance benefits. Recent research findings are synthesized to elucidate how these nanomaterials and their mixing proce
... Show MoreThe tunnel’s stability during construction is a very important matter. Some methods have been proposed for stability evaluation, but the hazard warning levels (HWLs) are more applicable among these methods. Despite monitoring and applying HWLs, several collapses in Shibli twin tunnels in Iran have cast doubts on the accuracy of this criterion in the presence of water. In this study, the critical strains under different water contents were measured through uniaxial compressive strength tests on 11 different shale and marl samples. A comparison of laboratory tests and numerical results shows that the influence of the moisture content on the critical strain is negligible. In addition, the results show that there is no dir
... Show MoreBackground: the primary objective for many researches carried out in dental implantology was to reduce the period needed for functional implant loading, simvastatin (cholesterol lowering medication) had many pleiotropic effects, one of which was increasing bone density around titanium implants (1) and subsequently establishing faster osseointegrated dental implants (2,3). This study aims to reduce the period of time needed to establish secondary stability of dental implant measured in ISQ (Implant Stability Quotient) by investigating the effect of orally administered simvastatin on bone. Materials and methods: simvastatin tablets (40mg/day for three months) were administered orally for 11 healthy women aged (40-51) years old who received 1
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More
Background: The aims of this study were to evaluate the effect of implant site preparation in low-density bone using osseodensification method in terms of implant stability changes during the osseous healing period and peri-implant bone density using CBCT. Material and methods: This prospective observational clinical study included 24 patients who received 46 dental implants that were installed in low-density bone using the osseodensification method. CBCT was used to measure the bone density pre- and postoperatively and implant stability was measured using Periotest® immediately after implant insertion and then after 6 weeks and 12 weeks postoperatively. The data were analyzed using paired t-test and the probability value <0.05 was conside
... Show MoreThis work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated from burnt herbs and collected in a smoke generator to delivered through
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show More