Let R be a commutative ring with identity and let M be a unital left R-module.
A.Tercan introduced the following concept.An R-module M is called a CLSmodule
if every y-closed submodule is a direct summand .The main purpose of this
work is to develop the properties of y-closed submodules.
Background: Cancer is a lethal disease that results from a multifactorial process. Progression into carcinogenesis and an abnormal cell proliferation can occur due to the micro and macro environment as well as genetic mutations and modifications. In this review, cancer and the microbiota – mainly bacteria that inhabit the tumour tissue – have been discussed. The positive and negative impacts of the commensal bacteria on tumours being protective or carcinogenic agents, respectively, and their strategies have also been described. Methods: Related published articles written in English language were searched from Google Scholar, PubMed, Mendeley suggestions, as well as Google search using a combination of the keywords ‘Microbiota, commens
... Show MoreThe definition of orthogonal generalized higher k-derivation is examined in this paper and we introduced some of its related results.
In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-derivative (PID) co
... Show MoreDate palm fiber is one of the common wastes available in the M. E. countries essentially Iraq. The aim of search to investigate the performance and effects of fiber date palm on the mechanical properties of high strength concrete, this fiber was used in three ratio 2, 4 and 6 % by vol. of concrete at ages of (7, 28, 90) days. Results demonstrated improvement in the compressive strength increased 19.2 %, 23.6%, 24.9 % for 2%, 4%, 6% of fiber respectively at age 28 days. Flexural strength increases 47.6%, 66.2%, 93.8% form (2,4,6) % of fiber respectively at age 28 days. Density increase about 0.41%, 0, 61 % 0.69 % for (2,4,6) % of fiber respectively at age 28. Absorption water decrease
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThere are many neutron sources in the universe that play an important role in the stellar slow neutron capture (s-process) nucleosynthesis. Fluorine-19 is a cosmically rare isotope that is generated in a series of reactions. The aim in this paper is to perform theoretical calculations to test the variance of neutron intensity generated within stellar conditions, especially in Asymptotic Giant Branch (AGB) stars, on the production of 19F isotope. EMPIRE II program has been utilized with the aid of many Matlab programs, and experimental comparisons have been made with NACRE II and Reaclib libraries. The results has shown that the high abundances of reactant nuclei responsible for ultimately generating
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More