Let R be a commutative ring with identity and let M be a unital left Rmodule.
Goodearl introduced the following concept :A submodule A of an R –
module M is an y – closed submodule of M if is nonsingular.In this paper we
introduced an y – closed injective modules andchain condition on y – closed
submodules.
The purpose of this research is to recognize the relationship between the dimensions of banking service quality and customer's satisfaction , through customer's evaluation of the level of service quality offered to them by Al – Rasheed bank. Also to determine the proportional importance of different dimensions of service quality. In addition to examine the relationship between banking service quality in its dimensions and customer's satisfaction. (150 ) samples were distributed among the bank customers , only (130 ) samples were collected and good for analysis.
The results were analyzed and examined the hypothesis through a group of statistical methods. The most important results is the positive evaluation of the ba
... Show MoreThe improvement of the mechanical soil characteristics of jet grouting technique is very attractive. The jet grouted soil cement columns in soft is a complicated issue because it depends on a number of factors such as, soil nature, mixture, influence among soil and grouting materials, jetting force of nozzle, jet grouting and water flow rate, rotation and lifting speed. This paper discusses the estimation of shear strength parameters of soil-cement column (soilcrete) in soft clayey soil based on the relationships between the unconfined compressive and split tensile strength for the soilcrete and the effect of the jet grouting and water pressure in the values of cohesion and internal f
This experiment was conducted in the season 2001-2000 in station Ishaqi the company's general industrial crops to plant livestock Vigna radala deleted (Khadrawi) carried out the experiment design panels splinter and order in RCBD with three balls two factors are levels nitrogen fertilizer (120 and, 100.0 kg urea / ha)nitrogen ratio of 46%, which put in the main panels mAIN PLOT and Alkiavat three levels that were placed in secondary panels .....
The study area is witnessing divergence where I am North wind North East wind as we find that the north wind is getting replicated as we move from the south, The reason can be attributed to the nature of the surface of the region, with at least repeat this wind the northern region to the presence of mountain ranges, while we find that energizes the surface in the center and south helped to increase repeat this wind gusts, It also finds that the North wind East prevail in the northern region and least replicated as we move from the north to the south and to the fact that North stations are within blowing this wind sites for the circles near the display of high pressure located centers to the north-east, north and distancing itself from pa
... Show MoreIn this paper, we introduce a new class of sets, namely , s*g-ï¡-open sets and we show that the family of all s*g-ï¡-open subsets of a topological space ) ,X( ï´ from a topology on X which is finer than ï´ . Also , we study the characterizations and basic properties of s*g-ï¡open sets and s*g-ï¡-closed sets . Moreover, we use these sets to define and study a new class of functions, namely , s*g- ï¡ -continuous functions and s*g- ï¡ -irresolute functions in topological spaces . Some properties of these functions have been studied .
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More