The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.
In this paper, we introduce the bi-normality set, denoted by , which is an extension of the normality set, denoted by for any operators in the Banach algebra . Furthermore, we show some interesting properties and remarkable results. Finally, we prove that it is not invariant via some transpose linear operators.
Lasers has been proved to increase tissue oxygenation, activate marrow progenitor cells, expanse the microcirculation, accelerate the restoration of functions, stimulate adaptation ability and stabilization of the hormonal status. The semisolid tissue present in the epiphysis of the bone where it’s structure is spongy or cancellous is bone marrow and it formed about 4% of body weight, the marrow is composed of hemopoietic cells, however, the structure of the marrow is of both cellular and non – cellular components. The hemopoietic stem cells are responsible of producing white blood cells, red corpuscles, platelets in addition to the fibroblasts, macrophages, adipocytes, osteoblast
Human health can be negatively impacted by exposure to loud noise, which can harm the auditory system. Traffic noise is the leading cause of noise pollution. This paper studies the problem of noise pollution on the roads in Baghdad, Iraq. Due to the increase in vehicle numbers and road network modifications in Baghdad, noise levels became a serious topic to be studied. The aim of the paper was thus to study traffic noise levels and the effect of the traffic stream on noise levels and to formulate a prediction model that identified the guidelines used for designing or developing future roads in the city. Then, the noise levels were measured based on five variables: the functional classification of roads, traffic flow, vehicle speed,
... Show MoreHistological study of the cerebellum in a bird white cheeked bulbul Pycnonotus lecucotis, the result of the study showed that the cerebellum took the parts of the hindbrain, the histological study of the cerebellum revealed the presence of deep folds on its surface. The cerebellum consists of two areas, the cerebellar cortex, which is called the gray matter, which consists of three layers: the outer layer (the molecular layer), the middle (Purkinje cells) and inner layer (the granular layer). The second area of the cerebellum is called the medullary and the white matter.
To evaluate the effects of the thermal analysis and temperature of the atmospheric heat on the optical system. it varying the thermal expansion (positive or Negative Values) of the material and then changes the characteri of the optical system properties such as radius of curvetur of the surfaces, size of the aperture stop ect.
This paper had calculated the accepted ratio of the temperature variable on the optical system during analyzing the effect of thermal analysis on the Radial Energy Distribution for +20C0 and +50C0 •
In this paper, we introduce and study the concept of a new class of generalized closed set which is called generalized b*-closed set in topological spaces ( briefly .g b*-closed) we study also. some of its basic properties and investigate the relations between the associated topology.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreThe research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta
... Show MoreWhen embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show More