Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes
The Ottomans ruled Turkey for nearly six centuries, during which the Ottoman Empire passed through varying periods in terms of strength, influence, and the area of land they ruled. In the last decade of its rule, the Ottoman Empire was severely weakened in all political, military, administrative and economic aspects. In addition to the internal strife that was stirred up by the leaders of the Association (Union and Progression), that organization that led the coup movement against the Ottoman Empire later.
After the abolition of the Sultanate and the proclamation of the Turkish Republic, the social fabric in Turkey changed, and many customs and traditions alien to it emerged to society. One of the thing
... Show MoreAn accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe nanocomposite on the base of synthesis Copper iodide
nanoparticles and polyvinyl alcohol (PVA/CuI) with different
concentration of CuI were obtained using casting technique.
PVA/CuI polymer composite samples have been prepared and
subjected to characterizations using FTIR spectroscopy, The FTIR
spectral analysis shows remarkable variation of the absorption peak
positions with increasing CuI concentration. The obtained results by
X-ray diffraction indicated the formation of cubic CuI particles. The
effects of CuI concentrations on the optical properties of the PVA
films were studied in the region of wavelength, (190-1100) nm.
From the derivation of Tauc's relation it was found that the direct
allowed t
High temperature superconductor with nominal composition Bi1.6Pb0.4Sr1.8Ba0.2Ca2 Cu3O10+? was prepared by solid state reaction method. Two sets of samples have been prepared .The first one was quenched in air; the second set was quenched in liquid nitrogen. X-ray diffraction analyses showed an orthorhombic structure with two phases, high –Tc phase (2223) and low-Tc phase (2212) in addition to that impure phase was found. It has been observed that quenched in air samples display a sharp superconducting transition and a higher-Tc phase than that of the quenched in liquid nitrogen samples.
This work describes the weathering effects (UV-Irradiation, and Rain) on the thermal conductivity of PS, PMMA, PS/PMMA blend for packaging application. The samples were prepared by cast method at different ratios (10, 30, 50, 70, and 90 %wt). It was seen that the thermal conductivity of PMMA (0.145 W/m.K), and for PS(0.095 W/m.K), which increases by PS ratio increase up to 50% PS/PMMA blend then decreased that was attributed to increase in miscibility of the blend involved. By UV-weathering, it was seen that thermal conductivity for PMMA increased with UV-weathering up to (30hr) then decreased, that was attributed to rigidity and defect formation, respectively. For 30%PS/PMMA, there results showed unsystematic decrease in thermal conduct
... Show MoreIn this work, results of a mathematical analysis of the role of workpiece preheating in laser keyhole welding were presented. This analysis considered the steady-state welding as well as certain range of boundary conditions over which preheating effect would be indicated. This work is an attempt to interpret the role of preheating to increase welding depth and perform keyhole welding with high quality using physical and thermal properties of steel alloys.
Abstract
The entities responsible for regulating the financial market are seeking to provide high quality accounting information, to provide appropriate protection to investors, and thus encourage them and attract them to increase their investments. the research reached several conclusion, the most prominent of which comes :-
1-The production of high quality accounting information reduces investment costs and costs of processing accounting information.
2- The production of high quality accounting information helps investors identify the best investment opportunities.
3- The results of the statistical analysis showed that there is significant
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More
