Experiment Factorial conducted with two factor in field texture silt clay loam soil, the first factor were Two Rotavator plow which different in number of rotary blades on flanges, weight, width, made and type, the second factor were four speeds tractor 2.62, 5.10, 7.55, 9.23 km/hr to compare performance two Rotavator under depth 12 cm and knowledge slippage, distance between beat blades, practical productivity, disturbed soil volume, percentage of the soil clods which have diameter less than 5 cm under complete block design with three replications using Least Significant Design 0.05. Results showed Galucho Rotavator recorder the higher practical productivity 0>7089 ha/hr, disturbed soil volume 809.8 m3/hr, percentage of the soil clods 96.19 % and distance between beat blades 0.156 m, Kubota Rotavator recorded least slippage 3.94 %. Speed tractor 9.23 km/hr recorded higher practical productivity 1.0512 hr/hr, disturbed soil volume 1173.6 m3/hr and the best slippage 1.80%.
The concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules was recently introduced by Omar A. Abdullah and Haibat K. Mohammadali in 2022, where he studies this concept and it is relationship to previous generalizationsm especially 2-Absorbing submodule and Quasi-2-Absorbing submodule, in addition to studying the most important Propositions, charactarizations and Examples. Now in this research, which is considered a continuation of the definition that was presented earlier, which is the Extend Nearly Pseudo Quasi-2-Absorbing submodules, we have completed the study of this concept in multiplication modules. And the relationship between the Extend Nearly Pseudo Quasi-2-Absorbing submodule and Extend Nearly Pseudo Quasi-2-Abs
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
In this article, unless otherwise established, all rings are commutative with identity and all modules are unitary left R-module. We offer this concept of WN-prime as new generalization of weakly prime submodules. Some basic properties of weakly nearly prime submodules are given. Many characterizations, examples of this concept are stablished.
Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreAbstract Throughout this paper R represents commutative ring with identity and M is a unitary left R-module, the purpose of this paper is to study a new concept, (up to our knowledge), named St-closed submodules. It is stronger than the concept of closed submodules, where a submodule N of an R-module M is called St-closed (briefly N ≤Stc M) in M, if it has no proper semi-essential extensions in M, i.e if there exists a submodule K of M such that N is a semi-essential submodule of K then N = K. An ideal I of R is called St-closed if I is an St-closed R-submodule. Various properties of St-closed submodules are considered.
The research is a vision of the future of industry in Iraq, so it is may be outside the ceiling of the capabilities of the Iraqi economy, and therefore it is exaggerated. Therefore, future plans must be applicable through the availability of capabilities. Everyone knows that the financial and administrative corruption and mismanagement of resources are the main cause of the inefficiency of the industrial sector, and the failure to exercise its real role in achieving economic development.; as well as the political situation and the dominance of parties and their insistence on addressing positions that have a strong relationship in managing the economic sector that has a significant impact on drawing the economic map in its current
... Show Moreيتكون الانحدار المقسم من عدة أقسام تفصل بينها نقاط انتماء مختلفة، فتظهر حالة عدم التجانس الناشئة من عملية فصل الأقسام ضمن عينة البحث. ويهتم هذا البحث في تقدير موقع نقطة التغيير بين الأقسام وتقدير معلمات الأنموذج، واقتراح طريقة تقدير حصينة ومقارنتها مع بعض الطرائق المستعملة في الانحدار الخطي المقسم. وقد تم استعمال أحد الطرائق التقليدية (طريقة Muggeo) لإيجاد مقدرات الإمكان الأعظم بالأسلوب الت
... Show MoreАрхив всех научных статей сборников конференций и журналов по направлению Филология.
The research aimed to prepare muscle elongation exercises for the arms with high intensity in which the training methods for young blind fencers vary, and to identify the effect of the diversity of muscle elongation exercises for the arms with high intensity on the cellular basal efficiency (lactic acid and sodium bicarbonate) and pulmonary respiration for young blind weapon fencers in terms of sports technology, and the experimental approach was adopted by designing the experimental and equal control groups, and the limits of the research community were represented by young fencers with shish weapon under the age of (20) years in the Army Sports Club, whose number is Total (15) swordsmen, continuing their training for the sports season (20
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence