In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.
In this paper we introduce the notion of semiprime fuzzy module as a generalization of semiprime module. We investigate several characterizations and properties of this concept.
Some authors studied modules with annihilator of every nonzero submodule is prime, primary or maximal. In this paper, we introduce and study annsemimaximal and coannsemimaximal modules, where an R-module M is called annsemimaximal (resp. coannsemimaximal) if annRN (resp. ) is semimaximal ideal of R for each nonzero submodule N of M.
The present research was conducted to synthesis Y-Zeolite by sol-gel technique using MWCNT (multiwalled carbon nanotubes) as crystallization medium to get a narrow range of particle size distribution with small average size compared with ordinary methods. The phase pattern, chemical structure, particle size, and surface area were detected by XRD, FTIR, BET and AFM, respectively. Results shown that the average size of Zeolite with and without using MWCNT were (92.39) nm and (55.17) nm respectively .Particle size range reduced from (150-55) nm to (130-30) nm. The surface area enhanced to be (558) m2/g with slightly large pore volume (0.231) km3/g was obtained. Meanwhile, degree of crystallization decrease
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreLet R be a commutative ring with unity. And let E be a unitary R-module. This paper introduces the notion of 2-prime submodules as a generalized concept of 2-prime ideal, where proper submodule H of module F over a ring R is said to be 2-prime if , for r R and x F implies that or . we prove many properties for this kind of submodules, Let H is a submodule of module F over a ring R then H is a 2-prime submodule if and only if [N ] is a 2-prime submodule of E, where r R. Also, we prove that if F is a non-zero multiplication module, then [K: F] [H: F] for every submodule k of F such that H K. Furthermore, we will study the basic properties of this kind of submodules.
The aim of the present work is to define a new class of closed soft sets in soft closure spaces, namely, generalized closed soft sets (
In this paper, we define and study z-small quasi-Dedekind as a generalization of small quasi-Dedekind modules. A submodule of -module is called z-small ( if whenever , then . Also, is called a z-small quasi-Dedekind module if for all implies . We also describe some of their properties and characterizations. Finally, some examples are given.
In this research, we introduce a small essentially quasi−Dedekind R-module to generalize the term of an essentially quasi.−Dedekind R-module. We also give some of the basic properties and a number of examples that illustrate these properties.
Background: The present article is concerned within the scope of Forensic Medicine, specifically Forensic Genetics. The case was taken care of in the Genetic-Molecular Laboratory of the Odessa Regional Bureau of Forensic-Medical Examinations, in Ukraine, during January and February of 2014.
Objectives: The aim of our work was to identify an unknown person, using the techniques: Y-chromosome markers and mitochondrial DNA typing.
Materials and methods: The materials available for our procedure were: pieces of tissue in paraffin blocks, saved from the corpse of the unknown person; blood from a living male subject, who claimed to be the grandfather, and from two females, allegedly the sisters. From all of them we extracted nuclear DNA
Background: Obesity (body mass index >30) is increasing worldwide with an estimated 1.7 billion people currently affected by the disease, Gallstone represent the third most common disease observed among obese patients. Moreover about 30% of the patients who are candidates for bariatric surgery either have undergone a prior cholecystectomy or are found to present gallstones at time of surgery, On the other hand, newly formed gallstones may be diagnosed in 27% to 43% of patients who have undergone bariatric surgery within a very short period of time.
Objective: To determine the prevalence of gallstone disease requiring cholecystectomy after laparoscopic sleeve gastrectomy and roux en Y gastric bypass during a one year follow up and t