The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.
The research aims to characterize the strategic plan of the Educational Professional Development Center, to reveal the most important training needs for teachers from this center, to reveal the extent to which this center meets those needs, and to identify the differences between teacher responses about the degree of importance, availability of those needs according to variables of sex, specialization, and years of experience. This descriptive study adopted a questionnaire applied to (256) teachers in the K.S.A. The results of the study showed that all training needs ranged in the degree of importance from large to very large and that the most important were the skills associated with communicating with members of the learning community.
... Show MoreActivated carbon was Produced from coconut shell and was used for removing sulfate from industrial waste water in batch Processes. The influence of various parameter were studied such as pH (4.5 – 9.) , agitation time (0 – 120)min and adsorbent dose (2 – 10) gm.
The Langmuir and frandlich adsorption capacity models were been investigated where showed there are fitting with langmmuir model with squre regression value ( 0.76). The percent of removal of sulfate (22% - 38%) at (PH=7) in the isotherm experiment increased with adsorbent mass increasing. The maximum removal value of sulfate at different pH experiments is (43%) at pH=7.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreAn experiment was conducted to study how SAE 50 engine oil contaminated with diesel fuel affects engine performance. The engine oil was contaminated with diesel fuel at concentrations of 0%, 1%, and 3%. The following performance characteristics were studied: brake-specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature. Each treatment was tested three times. The three treatments (0%, 1%, and 3%) were analyzed statistically with a one-way ANOVA model at the 5% probability level to determine if the three treatments produced significant differences in engine performance. The statistical results showed that there were significant differences in engine performance metrics among the three treatments. The 3
... Show MoreA freshwater bivalve plays a crucial function in aquatic habitats as the filtered water and burrowing mussels mix the sediment, thus increasing oxygen content and making the ecosystem healthier. The aim of the study is to see how chlorpyrifos affects biochemical markers in freshwater mussel Unio tigridis. About 180 individuals per taxon and water samples were collected from the Qandil water resource on the Greater Zab River, Erbil Province, Iraq. Once arrived at the lab, the individuals were kept in aquaria with river water and an air-conditioned room Temperature: 25±2 and Light: 12h/12h and acclimatized to laboratory conditions for seven days in aged tap water. The mussel's identification molecularly and the DNA sequence of t
... Show MoreBackground: Odontogenisis is a complex process controlled by dynamic and reciprocal interactions that regulated by various molecules. Thymosin β4 is a small bioactive peptide with wide spectrum biological effects on much cell types. The present study was designed to highlight the effect of synthetic exogenous Tβ4 on developing dental tissue of the upper central teeth of rats, by histological examination and immunohistochemical evaluation of TGFβ1. Materials and method: Thirty six Albino Wister pregnant rat 18control group received intraperitoneal injection of normal saline and the others are experimental group received 50µg/300µl of Tβ4 injection. The animals were sacrificed at periods 16th and 18th day I.U.L and one day p
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe study aimed to identify the news framing on the Israeli Arabic-speaking i24 channel of the Israeli aggression on Gaza -2021 by analyzing the channel’s Program “this evening”. The study used the media survey method, and in its framework, it relied on the content analysis method for the program’s episodes from May 5, 2021 AD until June 4, 2021 AD, with 22 episodes. The study showed the program’s interest in launching the Palestinian resistance’s rockets significantly, followed by the Israeli military operations, and the program’s reliance on correspondents largely as a source of news material related to the aggression. It also proved that a news report and a reporter's report was the most important form of presenting news
... Show More