Let R be a ring with identity and let M be a left R-module. M is called µ-lifting modulei f for every sub module A of M, There exists a direct summand D of M such that M = D D', for some sub module D' of M such that A≤D and A D'<<µ D'. The aim of this paper is to introduce properties of µ-lifting modules. Especially, we give characterizations of µ-lifting modules. On the other hand, the notion of amply µ-supplemented iis studied as a generalization of amply supplemented modules, we show that if M is amply µ-supplemented such that every µ-supplement sub module of M is a direct summand, then M is µ-lifting module. Finally, we give some conditions under which the quotient and direct sum of µ-lifting modules is µ-lifting.
The effect of adding sand on clayey soil shear strength is investigated in this study. Five different percentage of clay-sand mixtures are used; 100% clay with 0% sand termed 100C, 60% clay with 40% sand termed 60C-40S, 30% clay with 70% sand termed 30C-70S, 15% clay with 85% sand termed 15C-85S, and as well as 100% sand termed 100S. The used clay was obtained from Baghdad city in Iraq and classified as CH soil, while the used sand was taken from Al-Khider area from Iraq and classified as SW soil. The initial dry unit weight for all mixtures is 16 kN/m3. The results show that the variations of the soil shear strength properties with soil components content changes
Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som
... Show MoreAcademia Open Vol 8 No 2 (2023): December DOI: 10.21070/acopen.8.2023.8087 . Article type: (Medicine)Impact of COVID-19 on Dental Students' Psychological Health Maryam Hameed Alwan, [email protected], (1) Department of Oral Diagnosis, College of Dentistry, Baghdad University, Iraq, Iraq (1) Corresponding author Abstract This study investigates the psychological impact of the COVID-19 pandemic on dental students at Baghdad University College of Dentistry. Conducted between December 2021 and January 2022, this cross-sectional survey aligns with ethical guidelines and the Helsinki Declaration. The study utilized Cochran's equation to determine a sample size of at least 400, ensuring a 95% confidence level with a 5% margin of e
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices
... Show MoreHigh frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the
... Show More In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .