Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreLaboratory experiments were carried out in Technical college AL- Mussiab / Babylon during 2005 to study bioactivity of different concentration from ( aqueous , alcohol and hexane) extracts of bee venom collected from different workers of bees against some bacterial types that cause European Foul – brood Melissococcus plutom , Bacillus alvei and B. letrosporus which had been isolated from infected arched with disease . Two diffusion methods (digging and paper discs) were followed for the extraction of the venom . Results showed that digging diffusion method was more efficient for test of bacterial inhibition which led to increase the activity of bee venom extract with general a
... Show MoreCadmium sulfide photodetector was fabricated. The CdS nano
powder has been prepared by a chemical method and deposited as a
thin film on both silicon and porous p- type silicon substrates by spin
coating technique. Structural, morphological, optical and electrical
properties of the prepared CdS nano powder are studied. The X-ray
analysis shows that the obtained powder is CdS with predominantly
hexagonal phase. The Hall measurements show that the nano powder
is n-type with carrier concentration of about (-5.4×1010) cm-3. The
response time of fabricated detector was measured by illuminating
the sample with visible radiation and its value was 5.25 msec. The
specific detectivity of the fabricated det
The adsorption isotherms and kinetic uptakes of CO2 were measured. Adsorption isotherms were measured at two temperatures 309 K and 333 K and over a pressure range of 1 to 7 bar. Experimental data of CO2 adsorption isotherms were modeled using Langmuir, Freundlich and Temkin. Based on coefficient of correlation it was found that Langmuir isotherm model was well suited with the experimental data of CO2 adsorption isotherms. In addition, Adsorption kinetic of CO2 mixture with N2 containing 10 % by volume CO2 and 90 % by volume N2 were determined in a temperature 36 °C and under the atmospheric pressure .When the flow rate was increased from
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreEducational of the mind is a weapon to a different knowledges which
benefit in ife and developed the mind in many field and practice him in a
regular form in a right thinking and practice sense on exactly recognizing and
conception things which is senses and regulating the memory and providing
with benefit information which fit to minded of person,the present research
aimed at answering the following two questions:
1-Does the concept of mind differ with age?
2-Does the recognition on function of mind developed with development of
age?
The research population consisted of the children in the primary schools
of Baghdad/center,and the students of the Education for woman
college/Baghdad university for the age
The present study is undertaken to evaluate the effects of hypothyroidism induced by carbimazol in male rat reproductive system. Rats were treated with carbimazol (80 and 160 mg/kg body weight) daily for two, four, six, and eight weeks, while control rats were given distilled water orally. The results of these experiments are: 1-Treatment with carbimazol produced increase in body weight of treated animals. This increase was not statistically significant even at high concentrations. 2-Decrease in testicular weight was observed during all administration points. This decrease was aggravated proportional to duration and dose (p≤0.001). 3-Results of most intervals showed significant decrease in epididymal-head weight, while no sig
... Show MoreBromelain is a proteolytic enzyme rich in cysteine proteases, extracted from the stem and fruit of pineapple (Ananas comosus). There are several therapeutic applications of the bromelain enzyme, where it has anti-inflammatory, anti-cancer, and antimicrobial activity, reduces joint pain, and accelerates wound healing. In the current study, bromelain enzyme was loaded on silver nanoparticles (Br-AgNPs) prepared using the citrate-reduction Turkevich method. Different characterization analyses were performed, including UV-Vis spectrophotometers, FTIR, SEM, and XRD analyses. Moreover, the antioxidant activity of prepared Br-AgNPs was evaluated by DPPH assay. The results of UV-Vis showed a peak at 434 nm, which referred to the AgNPs f
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show More