Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The aim of the work is synthesis and characterization of bidentate ligand [3-(3-acetylphenylamino)-5,5-dimethylcyclohex-3-enone][HL], from the reaction of dimedone with 3-amino acetophenone to produce the ligand [HL], the reaction was carried out in dry benzene as a solvent under reflux. The prepared ligand [HL] was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [HL] was used as a primary ligand while 8-hydroxy quinoline [HQ] was used as a secondary ligand with metal ion M(Π).Where M(Π) = (Mn ,Co ,Ni ,Cu ,Zn ,Cd and Pd) at reflux ,using ethanol as a solvent, KOH as a base. Complexes of the composition [M(L)(Q)] with (1
... Show MoreBP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.
Background: Although mammography is a powerful screening tool in detection of early breast cancer, it is imperfect, particularly for women with dense breast, which have a higher risk to develop cancer and decrease the sensitivity of mammogram, Automated breast ultrasound is a recently introduced ultrasonography technique, developed with the purpose to standardize breast ultrasonography and overcome some limitations of handheld ultrasound, this study aims to evaluate the diagnostic efficacy of Automated breast ultrasound and compare it with handheld ultrasound in the detection and characterization of breast lesions in women with dense breasts.
Objectives:<
... Show MoreThe purpose of this study was to measure serum levels of insulin-like growth factor-binding protein (IGFBP7), Insulin-like Growth Factor 1 (IGF-1), Growth Hormone (GH), Interleukin 6 (IL-6) and insulin in acromegaly patients and healthy controls. The acromegaly group had 60 patients, while the population group had 30 people who had never had acromegaly before. The concentration of IGFBP7, IGF-1, GH, IL-6, and insulin were determined. The results of the present study indicate that IGFBP7 level in the acromegaly group was significantly lower (1.690.07 ng/mL vs. 2.740.12 ng/mL, respectively, p = 0.001). IGF-1, GH, IL-6, and insulin concentrations were also significantly higher in acromegaly patients. The diagnostic accuracy (2.194) was exce
... Show MoreThe aim of this study was to evaluate the risk factors that influence the perforation, regardless of the presence of H. pylori infection, in a sample of Iraqi patients with peptic ulcers, admitted to Al-Kindy Teaching Hospital. A total of 90 patients who had perforated peptic ulcer participated in this study. The diagnosis was based on history, clinical examination, laboratory and radiological investigations and was confirmed intraoperatively. A number of probable risk factors for perforation were investigated. Eighty participants were males and 10 were females (male to female ratio 8:1). About 42.2% of patients were in their fifth decade of life. Forty-nine (54.4%) patients were asymptomatic be
Background: Ankylosing spondylitis is a chronic inflammatory disease that mostly involves the spine and sacroiliac joints. It is associated with a decreased quality of life. Biological medicines such as infliximab and its biosimilar are the mainstay treatments for active ankylosing spondylitis.
Objective: The study objective was to conduct a pharmacoeconomic study comparing the cost-effectiveness of the reference infliximab with its biosimilar in ankylosing spondylitis patients visiting public hospitals.
Subjects and Method: This is a two-center pharmacoeconomic study performed at two large teaching governmental hospitals in Baghdad, Iraq, which s
... Show MoreCognitive-behavioral therapy is one of the most important relatively recent; treatment programs that attempt to modify behavior and control psychological disorders by modifying the individual's thinking style and awareness of himself and his environment, and cognitive reconstruction by replacing negative thoughts with positive ones. The current study aimed to know the effectiveness of a cognitive behavioral treatment program in reducing nervous fatigue among mothers of children with cerebral palsy. The sample on which the nervous fatigue scale was applied consisted of (30) mothers whose son suffers from cerebral palsy, and the results indicated that (24) mothers suffer from nervous fatigue. This sample was divided
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More