Let R be a Г-ring, and σ, τ be two automorphisms of R. An additive mapping d from a Γ-ring R into itself is called a (σ,τ)-derivation on R if d(aαb) = d(a)α σ(b) + τ(a)αd(b), holds for all a,b ∈R and α∈Γ. d is called strong commutativity preserving (SCP) on R if [d(a), d(b)]α = [a,b]α(σ,τ) holds for all a,b∈R and α∈Γ. In this paper, we investigate the commutativity of R by the strong commutativity preserving (σ,τ)-derivation d satisfied some properties, when R is prime and semi prime Г-ring.
Seeds of Nigella sativa were sown in containers containing 15kg Loamy soil. The seeds were divided before sewing into two groups. The first group was soaked with ordinary tap water end the second group was treated with magnetized water for 24hrs. The irrigation process was completed until 75% of capacity field with two types of water (tap water of magnetized water with three replications).The magnetized water was obtained from special electric device designed for this purposeRecorded measurements (plants height, the number of branches/ plant, dry weight ofplant, number of flowers, 1000 seed weight) during the harvest period.Results indicated that the seed group which was treated with magnetized water was more significant than the one which
... Show MoreA field experiment was carried out in Horticulture Department / Collage of Agricultur e/University of Baghdad to study influence of adding ascorbic acid(asa) and bread yeast extract in snap bean cv.primel under irrigation with saline water using sodium chloride salt (NaCl) during spr ing season of 2016 .A factorial experiment using Randomized Complete Block Design( RCBD) with three replications wereconducted . The first factor includes three treatments of salinity which were tap water ( S0), 4ds.m-1(S1) and 8ds.m-1 (S2) . The second factor includes three treatments which were control treatment without any adding (C) ,ascorbic acid 0.3g.l-1( A ) and yeast extract 12g.l -1( Y ). Results showed significant and gradually decreases in all studie
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreIn the current research, the work concentrated on studying the effect of curvature of solar parabolic trough solar collector on wind loading coefficients and dynamic response of solar collector. The response of collector to the aerodynamic loading was estimated numerically and experimentally. The curvature of most public parabolic trough solar collectors was investigated and compared. The dynamic response of solar collector due to wind loading was investigated by using numerical solution of fluid-structure interaction concept. The experimental work was done to verify the numerical results and shows good agreement with numerical results. The numerical results were obtained by using finite element software package (ANSYS 14). It was found
... Show MoreThis study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance