In this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
this paper, we will prove the following theorem, Let R be a ring with 1 having
a reverse derivation d ≠ 0 such that, for each x R, either d(x) = 0 or d(x) is
invertible in R, then R must be one of the following: (i) a division ring D, (ii) D 2 ,
the ring of 2×2 matrices over D, (iii) D[x]/(x ) 2
where char D = 2, d (D) = 0 and
d(x) = 1 + ax for some a in the center Z of D. Furthermore, if 2R ≠ 0 then R = D 2 is
possible if and only if D does not contain all quadratic extensions of Z, the center of
D.
The purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil
... Show MorePlayfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using key matrix and the second stratum is a transposi
... Show MoreThis study was conducted in Diyala province for renal failure patients during the periods August 2015 - April 2016. Hundred renal failure patients were enrolled in the study after diagnosis by the consultant physician at Ibn-Sina Center for Dialysis in Baquba Teaching Hospital according to criteria adopted by the World Health Organization for diagnosis of renal failure disease. The number of males in patient’s sample was 61 (61%) and females was 39 (39%) with an age range of 10 – 88 year (44.7 ± 22.1 year). In addition, the study included 50 apparently healthy individuals and considered as a group control, in which the number of males and females was similar (25 individual), with an age range of 18 – 88 year (51.7 ± 17.3 year). The
... Show MoreBackground: Mobile phones are approximately widely used everywhere like in hospital wards, clinics and universities as well as biomedical laboratories. They have become very important tool in students’ life. In contrast, these tools carry many harmful bacteria which are responsible for infectious diseases in human because they serve as a reservoir for different pathogens. Current study was aimed to isolate bacteria from students’ mobile phones at the Institute of Medical Technology/Al-Mansour/The Middle Technical University, Baghdad, Iraq. Also, the study investigated microbial resistance to many antimicrobial agents as well as the appropriate remedial measures. Method: Four hundred and fifty swabs from mobile phones were collected from
... Show MoreThis study was conducted in Al-Salam station for Dairy cattle/private sector, for the period from 1-11-2016 to 1-11-2017, to determine the association between BTN1A1 gene polymorphism and reproductive efficiency indicator and heat tolerance in 50 Holstein cows. The results of BTN1A1 gene analysis showed a highly significant Different (P<0.01) between genotypes of BTN1A1 gene’s genotypes AA, AB the percentage were 72.00, 28.00 % respectively. Results showed that services per conception and days open was significantly (P<0.05) affected by polymorphism of BTN1A1 gene and for cows with AA genotype, there was also a significant difference (P<0.05) between the genotypes of BTN1A1 gene for IgG concentration in calves blood who belong to mother
... Show MoreDensities ρ and viscosities η for several concentrations of amino acids (Serine, Cysteine and Threonine) at different temperatures (298.15, 303.15 and 308.15K) have been measured. On the basis of these data, the apparent molal volumes v , partial molal volumes at infinite dilution v , slope Sv , Gibbs free energy of activation for viscous flow of solution ∆G1,2 and Jones – Dole Bcoefficients were calculated the nature of solute-solvent and solute-solute interactions have been discussed in terms of the values of v , v , Sv and B-coefficents
A study of taxonomic quality of soil algae was conducted with some environmental variables in three sites of local gardens (Kadhimiya, Adhamiya and Dora) within the governorate of Baghdad for the period from October 2016 to March 2017. The study identified 28 species belonging to 16 species in which the predominance of blue green algae (18 species) Followed by Bacillarophyta algae (7 species) and three types of Chlorophyta. The study showed an increase in species of Oscillatoria. The results showed no significant differences between sites in temperature, pH and relative humidity, while there were clear differences between sites for salinity and nutrient The study showed a difference of irrigation water quality and use of different fertilize
... Show More