Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
In this work an enzyme linked immunosorbent assay (ELISA) technique has been used for detection of some inflammatory markers in serum of acute coronary syndrome (ACS)-Patients Admitted to the cardiac care unit (CCU) of Iraqi Centre For Heart Diseases and Ibn AlNafees Teaching Hospital. The present method includes quantitative measurement of interleukine-6 (IL-6) and C-reactive protein (CRP), as their increase during symptoms may be responsible for identifying the mechanism of myocardial damag, in addition to their best performance than other quantitative tests perhaps due to their association with atherosclerotic process that belongs to the endothelial dysfunction. Aim of this study is to estimate the prevalence and correlation of IL-6 w
... Show MoreAbstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe research aims to identify the meaning of drug addiction, which being one of the behavioral-deviation signs. It largely seems similar to alcohol-addiction. World health organization has defined drug addiction as a sporadic or chronic-state of intoxication emerges of recurrent-consumption of drugs that impact harmfully on individual and society. The second aim is to study the psychological and health implications on drugs’ users and thirdly to design a psychological-program for those who take drugs.
In the current research, the work concentrated on studying the effect of curvature of solar parabolic trough solar collector on wind loading coefficients and dynamic response of solar collector. The response of collector to the aerodynamic loading was estimated numerically and experimentally. The curvature of most public parabolic trough solar collectors was investigated and compared. The dynamic response of solar collector due to wind loading was investigated by using numerical solution of fluid-structure interaction concept. The experimental work was done to verify the numerical results and shows good agreement with numerical results. The numerical results were obtained by using finite element software package (ANSYS 14). It was found
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreAn experiment was conducted to study how SAE 50 engine oil contaminated with diesel fuel affects engine performance. The engine oil was contaminated with diesel fuel at concentrations of 0%, 1%, and 3%. The following performance characteristics were studied: brake-specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature. Each treatment was tested three times. The three treatments (0%, 1%, and 3%) were analyzed statistically with a one-way ANOVA model at the 5% probability level to determine if the three treatments produced significant differences in engine performance. The statistical results showed that there were significant differences in engine performance metrics among the three treatments. The 3
... Show MoreA freshwater bivalve plays a crucial function in aquatic habitats as the filtered water and burrowing mussels mix the sediment, thus increasing oxygen content and making the ecosystem healthier. The aim of the study is to see how chlorpyrifos affects biochemical markers in freshwater mussel Unio tigridis. About 180 individuals per taxon and water samples were collected from the Qandil water resource on the Greater Zab River, Erbil Province, Iraq. Once arrived at the lab, the individuals were kept in aquaria with river water and an air-conditioned room Temperature: 25±2 and Light: 12h/12h and acclimatized to laboratory conditions for seven days in aged tap water. The mussel's identification molecularly and the DNA sequence of t
... Show More