The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.
المستخلص
، ( اب ( ١٩٢٢ ô یدتھ ارض الیب ô ي قص ô وت ،ف ô زي الی ô اعر الانجلی ô یھدف ھذا البحث الى بیان مدى تأكید الش
ن ô ة م ô ان والطبیع ô ین الانس ô ت ب ô ا ربط ô ي لطالم ô ة ،الت ô على الحاجة الملحة للانسان الحدیث لاسترجاع الصلة الحمیم
ة ô ي بمثاب ô ة ھ ô ان الثلاث ô ذه الارك ô ین ھ ô ة ب ô ة الموثق ô ذه العلاق ô رى .ان ھ ô ة اخ ô ن جھ ô جھة ، وبین الانسان والاسطورة م
ات ô ي الثقاف ô ة ف ô وس الدینی ô وبة والطق ô اطیر الخ
DBNRHM Sami, International Journal of Research in Social Sciences and Humanities, 2020
In this article, we introduce a class of modules that is analogous of generalized extending modules. First we define a module M to be a generalized ECS if and only if for each ec-closed submodule A of M, there exists a direct summand D of M such that is singular, and then we locate generalized ECS between the other extending generalizations. After that we present some of characterizations of generalized ECS condition. Finally, we show that the direct sum of a generalized ECS need not be generalized ECS and deal with decompositions for be generalized ECS concept.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreA perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after ca
... Show MoreSolar energy usage in Iraq is facing many issues; one of those is the accumulation “of the dust on the surface of the solar module which” would highly lower its efficiency. The present work study the effect of dust accumulation” on installing fixed solar modules with different inclined angles 15o, 33o, 45o, 60o. Evaluation of the solar modules performance under different circumstance conditions such as rain, wind and humidity are considered in study of dust effect on solar module performance. The results show that the lowest output average efficiencies of solar modules occurs at 15o horizontally inclined angle are 7.4% , 6.7% , 8.0% , 8.1%, and 8.4% for the cor
... Show MoreThe results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola
In the present paper, we have introduced some new definitions On D- compact topological group and D-L. compact topological group for the compactification in topological spaces and groups, we obtain some results related to D- compact topological group and D-L. compact topological group.
In this paper the experimentally obtained conditions for the fusion splicing with photonic crystal fibers (PCF) having large mode areas were reported. The physical mechanism of the splice loss and the microhole collapse property of photonic crystal fiber (PCF) were studied. By controlling the arc-power and the arc-time of a conventional electric arc fusion splicer (FSM-60S), the minimum loss of splicing for fusion two conventional single mode fibers (SMF-28) was (0.00dB), which has similar mode field diameter. For splicing PCF (LMA-10) with a conventional single mode fiber (SMF-28), the loss was increased due to the mode field mismatch.