Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
ABSTRACT : The restoration of bone continuity and bone union are complex processes and their success is determined by the effectiveness of osteosynthesis. The use of plants for healing purposes predates human history and forms the source of current modern medicine. This research was planned to study the histological and immunohisto-chemistry of osteocalcin to evaluate of effect of local application of lepidium sativum oilon healing of induced bone defect in rat tibia. In this study, fourty albino male rats, weighting (300-400) gram, aged (6-8) months, will be used under control conditions of temperature, drinking and food consumption. The animals will subject for a surgical operation of medial side of tibiae bone, in control group the bone
... Show MoreBackground. The use of modern aids and technology has contributed greatly to football development, the goalkeeper is the most important position in the team, and the use of devices gave objective readings about the goalkeeper's ability in terms of skill and physical aspects. Objectives. The research aimed to prepare exercises using an electronic device to measure the knee bending angle because of its great importance in developing the skill of catching and dimensions of the high ball for football goalkeepers. Methods. The researchers used the experimental method, and the sample consisted of (4) male goalkeepers under 15 years of age, one of the research procedures was to determine the biomechanical variables affecting the development of the
... Show MoreElectrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the
Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.
Abstract:
The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s
... Show MoreThe importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading role of organizations in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul. .
After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More