Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes
Enterotoxin of Vibrio cholerae was extracted by cooling centrifuge at 6.000 rpm for 30 minntes. and filtrated by using milipore filter (0.22 ?m). The effect of crude enterotoxin on phagocytosis was studied by measuring the phagocytic index for 20 blood sample which were collected from healthy people and treated with enterotoxin in addition to control samples. From the results we found that phagocytic index of blood sample which were treated with enterotoxin was 42.9% while the phagocytic index of control blood samples was 64%. This means that there is a negative effect for the enterotoxin resulted from vibrio choleaa on the activity of phagocytic index.
A comprehensive review focuses on 3D network-on-chip (NoC) simulators and plugins while paying attention to the 2D simulators as the baseline is presented. Discussions include the programming languages, installation configuration, platforms and operating systems for the respective simulators. In addition, the simulator’s properties and plugins for design metrics evaluations are addressed. This review is intended for the early career researchers starting in 3D NoC, offering selection guidelines on the right tools for the targeted NoC architecture, design, and requirements.
The activation energy and optical band gap of different regions (p-type) polysilicon have been measured. Both microscopic studies and current-voltage characteristics of diodes prepared on different surface regions were carried out. Comparison of diodes parameters and microscopic studies indicate that the type of angles between boundaries has a significant effect on diodes parameters while the boundary lengths per unit area has less effect. The mechanism of Al-interaction with grain boundaries and their intersecting points at different temperature were also studies. The X-ray fluorescence spectrometry has been used for detection of diffused A1%.
Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MorePseudoephedrine (PSE), often known as Sudafed, belongs to a class of medications known as sympathomimetic amines, which affect the digestive system, respiratory system, and cardiovascular system. This drug has a long history of medical use; it is helpful in treating symptoms of the common cold and flu, sinusitis, asthma, and bronchitis. Due to its central nervous system (CNS) stimulant properties and structural similarity to amphetamine, it is also used for non-medical purposes such as doping agent, to increase focus, and as a substance that gets rid of exhaustion and drowsiness. Nevertheless only a few studies, backed up its impact on solid abdominal organs. The aim of this task is to investigate the effect of some dosages of PSE
... Show MoreThis paper investigates the concept (α, β) derivation on semiring and extend a few results of this map on prime semiring. We establish the commutativity of prime semiring and investigate when (α, β) derivation becomes zero.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More