Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThis research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show MoreThe purpose of this paper is to identifying the values of some physical and Bio- Kinematic variables during the performance of the jump spike serve skill, and identifying the effect of the proposed training program using intermittent training to develop some physical and Bio- Kinematic variables and accuracy of the jump spike serve skill among the research sample. The experimental method was used and the research was conducted on a deliberately chosen sample of the players of the Army Club, who were primarily advanced in volleyball, and the number of the sample was (10) players. The conclusions were reached that the proposed training program using intermittent training has a positive effect on some of the physical and Bio- Kinematic variabl
... Show MoreSpecies of genus Chrotogonus (surface grasshoppers) are phytophagous and damaging to various economical important plants in their seedling stages. In order to know the biodiversity of surface grasshoppers, the detailed study has been conducted from four provinces of Pakistan. During this study, biodiversity, taxonomy, diagnosis, morphometric analysis, habitat, global distribution, and remarks of each species have been described. Total of 826 specimens were collected and sorted out into three species and three subspecies: C. (Chrotogonus) homalodemus homalodemus (Blanchard, 1836), C. (Chrotogonus) homalodemus (Blanchard, 1836), C. (Chrotogonus) trachypter
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MorePurpose: The research aims to determine the relationship between E-Learning and Total Quality Management (TQM) in Educational institutions in Nineveh Governorates.
Methodology / Design: The researchers distributed (30) questionnaires to employees (teachers and administrators) of Nineveh Governorate education who represent the community of the research sample, as they were analyzed using the SPSS V.20
The importance of research: The importance of the research in the fact that it focuses on one of the educational methods represented in integrating the traditional method and relying on modern technologies using computers and the Internet in the field of education to improve the reali
... Show MoreBusiness Ethics play a major role in explaining the behavior of those interested in the management of tourism enterprises in the field of management gains, which sometimes turn to manipulation in the specification of the service of tourism and influence in the technical characteristics at the expense of the brand and market share, as well as misleading beneficiaries about the fact that the performance of the service of tourism, may depend activities tourist dramatically when submitting and sharing various services on the types of mutual relations the framework for moral distinct, in interaction or direct contact between producers of tourism services and tourists or their beneficiaries, in order to provide comfort and recreation a
... Show More