Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Background:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients
Background: Pervasive Developmental Disorder (PDD) is a term refers to the overarching group of conditions to which autism spectrum disorder (ASD) belongs .
Objective: This study was designed to determine the existing behavior of children with autism in dental sitting, the behavior improvements in recall dental visits and evaluate the improvement in oral hygiene with using specific visual pedagogy chart.
Type of the study: Cross-sectional study.
Methods: Forty children of both genders, ages ranged from 4 – 6 years having primary teeth only were selected whose medical history included a diagnosis
... Show MoreSpelling correction is considered a challenging task for resource-scarce languages. The Arabic language is one of these resource-scarce languages, which suffers from the absence of a large spelling correction dataset, thus datasets injected with artificial errors are used to overcome this problem. In this paper, we trained the Text-to-Text Transfer Transformer (T5) model using artificial errors to correct Arabic soft spelling mistakes. Our T5 model can correct 97.8% of the artificial errors that were injected into the test set. Additionally, our T5 model achieves a character error rate (CER) of 0.77% on a set that contains real soft spelling mistakes. We achieved these results using a 4-layer T5 model trained with a 90% error inject
... Show MoreThe subject of the provisions of prayer on the chairs of the important topics in the jurisprudence they fall under the door of the people of excuses, and this section of the important doors in Islamic jurisprudence because it permeates scourge, as prayer is one of the pillars of this religion, and the first thing to be held accountable on the Day of Resurrection prayer If the peace reconciled the rest of his work and spoil corrupted all his work, the street wise was interested in this matter and put him provisions overlooked by many people these days became insulted him and do not pardon him, and do not know the rules and provisions approved by Shara, and the omission of one of these provisions is possible To lead to the invalidity of hi
... Show MoreIn the present article, mixed ligand metal (II) complexes have been synthesized with Schiff base (1E, 5Z, 6E)-1,7 bis (4-hydroxy-3- methoxyphenyl)-5-(3-hydroxyphenyl) imino) hepta-1,6-dien-3-one derived from Curcumin and 3-aminophenol as primary ligand and L-dopa as a secondary ligand. The Schiff base act as bidentate and arrange to the metals through the azomethine (C=N) nitrogen and (C=O) oxygen atom. The mode of bonding of the Schiff base has been affirmed on the infrared by the UV-Visible, 1H, and 13C NMR spectroscopic techniques. The magnetic susceptibility and the UV-Vis data of the complexes propose octahedral geometry around the central metal ion. The information appears that the complexes have the structure of [L-M-(L-dopa)] system
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreInflammation of the tonsils could be described as acute tonsillitis, mainly due to infection. Recurrent tonsillitis could be defined as 3-7 episodes during the first 3 years of age. Vitamin D, which is a neuro-hormone with pleiotropic biological activities may modulate the immune response by alleviation, and stimulation of Th1 and Th2 cell proliferation, respectively, that influence the stimulation, synthesis, and secretion of both pro and anti-inflammatory cytokines. In this study we aimed to shed light on the levels of vitamin D in children with different episodes of tonsillitis in association with levels of interleukins (TNFα, IL-2, IL-4, IL-10). Blood samples were collected from 48 participants in 3 groups: control, acute tonsilliti
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More