In this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Background: The repair of bone defects remains a major clinical challenge in dentistry. Bone is a highly vascularized tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. The health promotive , preventive, and curative properties of herbs were recognized by the ancient and the present pharmacist and physicians to form the theoretical foundations in Medicine. Objective: Immunohistochemistry of osteocalcin and histological study to prove that symphytum officinale oil when applied locally on generated bone defect healing in rat tibia, it was very effectiveness. Patients and Methods: 0ur study fourty male rats , weighting (250-350) grams ,aged (5 7)months ,was
... Show MoreThe aim of the present study is to identify the level of prosoical behavior of Baghdad University's students and to recognize the differences between male and female students. Moreover, it also aims to identify the level of openness to experience for these students. A random sample of (123) students has been selected; 77 males and 46 females. Two scales have been used in the study. The Prosocialness scale for adults by Caprara. Et al (2005) has been translated into the Arabic language and relies on four types of actions (Helping, Sharing, Taking care, and feeling Empathetic with others) and the other scale is the Openness to Experience Scale, which is one of the Big Five Inventory by John and Srivastava (1999). The main results showed a
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Introduction:
Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank
... Show MoreFind cares studying the aesthetics of environmental art, one of the topics that is one of the problems of the aesthetic side in the arts of postmodernism, so this research came as an attempt to get to know the aesthetic concepts of environmental art that can be learned from functional testing in the formation of the post-modern control. The research involved four chapters: The first chapter discusses the general framework of the research methodology, as it was displayed in itThe research problem and its importance and define its objective to identify the aesthetics of environmental art at the level of the body, meaning, the receiver .ozlk in Iraq and America as the spatial limits of the time limits are period stretching from 1970 to 2006
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show More