Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
The study aimed to reveal the extent of the first intermediate grade science curriculum focus on the national values, health, environmental, economic values, in the light of the education policy in the Kingdom of Saudi Arabia, in addition to present a proposed vision to strengthen it in the science curriculum for the first intermediate grade. The study was applied to the two books student and the two books of activity on the first-second semesters for the academic year 1441 AH. To analyze the curriculum content, the study used a verified card prepared by the researchers and a criterion for interpreting percentages. The study reached the following results: environmental values ranked first with a concentration of (43%), i.e. with an avera
... Show MoreRice (Oryza sativa) is a fundamental food for the majority of world population. Cyclin Dependent Kinase -A (CDKA) accelerates transition through different stages of cell cycle and contributes in gametes formation. In the present investigation, a CDKA encoding gene along with the corresponding protein were characterized in O. sativa Indica Group, O. glaberrima, O. barthii, O. brachyantha, O. glumipatula, O. longistaminata, O. meridionalis, O. nivara, O. punctata and O. rufipogon using in silico analyses. The results reflected little variation in most species except O. longistaminata and O. brachyantha. Compared with the remaining species, O. longistaminata
... Show MoreThis research aims to identify the role that forensic accounting plays on the transparency and quality of the financial statements in trade bank of Iraq and the Gulf Commercial Bank in Babylon. This research came to address the problem that most financial institutions suffer from, which is represented by the lack of transparency and the quality of the financial statements issued in a manner. Annual also the manipulation and fraud in the financial data, which causes a big gap between that institutions and organizational stakeholders. According to the implementation of the research hypothesis and the objectives of the research, a questionnaire was prepared consisting of three axes, the first axis dealing with the demographic distri
... Show MoreThis study involved the effect of anew nickel (II) complexs with formla [NiL2(H2O)2].2.5ETOH where L=Bis[5-(p-nitrophenyL)-4-phenyL-1,2,4-traizole-3-dithocarbamato hydrazide] diaqua. nickel(II). Ethanol(2.5).and anti-cancer drug cyclophosphamide on specific actifity of two Liver enzymes (GOT,GPT) in the (Liver,kidney) tissues and on the creatinine Level in the kidney byUtilizing an invivosystem in femalmice.The result showed that inhibition in the activity of GPT and GOT enzymes in theLiver and in both nickel (II) complex and cyclophosphamide drug (CP) . mice weretreated with three doses (90,180,320) µg/mouse for three days for each group.The Liver show's the highest rate of GPT inhibition was about 97.43% at180µg/mouse regarding the ki
... Show MoreVaried uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More