In this paper, we introduce the concept of almost Quasi-Frobcnius fuzzy ring as a " " of Quasi-Frobenius ring. We give some properties about this concept with qoutient fuzzy ring. Also, we study the fuzzy external direct sum of fuzzy rings.
The Iraqi-Kuwaiti relations represent a great issue for the Arab-Arab relations. This relation is characterized by specificity for the tension since the foundation of the State of Kuwait until late. There are many factors that prevented the fulfillment of the aspiration towards the development of the relations, perhaps the most important of which is the issue of Mubarak Great Port which is a difficult issue as far as the relation between the two states is concerned. One year after Iraq put the cornerstone of the Great Faw Port. This is considered as the most important hurdle in front of constructing the relations with the neighbor Kuwait
In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
In Libya, there are multiple sources of pollution, one of which is animal waste. The anaerobic digestion (AD) of organic wastes to produce biogas has the advantage of producing valuable, renewable energy while reducing the environmental impact of these wastes. Cowmanure have the potential to produce biogas due to their high organic content. This study aimed to study different concentrations for the feedstock (1:1 and 2:1 cow manure: water v/v) to monitor which one gives higher biogas production. A plastic tank with a capacity of 72 liters and a feedstock volume of 60 liters was used to create a pilot scale. The biogas was analyzed using a GC device at the end of the experiment in the Zawiya Oil Refining Company. The result indicated that th
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreEnterotoxin of Vibrio cholerae was extracted by cooling centrifuge at 6.000 rpm for 30 minntes. and filtrated by using milipore filter (0.22 ?m). The effect of crude enterotoxin on phagocytosis was studied by measuring the phagocytic index for 20 blood sample which were collected from healthy people and treated with enterotoxin in addition to control samples. From the results we found that phagocytic index of blood sample which were treated with enterotoxin was 42.9% while the phagocytic index of control blood samples was 64%. This means that there is a negative effect for the enterotoxin resulted from vibrio choleaa on the activity of phagocytic index.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More