Weosay thatotheosubmodules A, B ofoan R-module Moare µ-equivalent , AµB ifoand onlyoif <<µand <<µ. Weoshow thatoµ relationois anoequivalent relationoand hasegood behaviorywith respectyto additionmof submodules, homorphismsr, andydirectusums, weaapplyothese resultsotoointroduced theoclassoof H-µ-supplementedomodules. Weosay thatoa module Mmis H-µ-supplementedomodule ifofor everyosubmodule A of M, thereois a directosummand D ofoM suchothat AµD. Variousoproperties ofothese modulesoarepgiven.
Abstract:
the system of Administrative Control in organizations meets the need to check on the optimal use and proper resources and conservation to achieve the objectives sought by the organization, hence the system of Administrative Control is part of the overall system in any organization that has undergone evolution always to be able to keep up with progress in the development of other sciences, and that the growth of coherence between subordinates in the organization means the ability to influence the opinions, ideas and attitudes to change it for directions the organization and its values and this is reflected positively on the coherence of the organization, the researcher interest of the imp
Relation on a set is a simple mathematical model to which many real-life data can be connected. A binary relation on a set can always be represented by a digraph. Topology on a set can be generated by binary relations on the set . In this direction, the study will consider different classical categories of topological spaces whose topology is defined by the binary relations adjacency and reachability on the vertex set of a directed graph. This paper analyses some properties of these topologies and studies the properties of closure and interior of the vertex set of subgraphs of a digraph. Further, some applications of topology generated by digraphs in the study of biological systems are cited.
Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86
... Show MoreAs regional development, as a matter of course, poses a number of systemic, scientific and political problems. While the issue of development is primarily at the national level to the limits of World War II in the industrialized world and to the 1960s borders in most Third World countries, the increasing awareness of regional disparities has led to the regional issue Were taken into consideration in the early 1960s and 1970s in most industrialized and developing countries alike. The local issue was only introduced in the early 1980s. The awareness of regional disparities and the fact that the regions do not have the same potential and that some regions have the resources to enable them to develop, grow and develop, unlike other r
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreIn this essay, we utilize m - space to specify mX-N-connected, mX-N-hyper connected and mX-N-locally connected spaces and some functions by exploiting the intelligible mX-N-open set. Some instances and outcomes have been granted to boost our tasks.
Let R be an associative ring. In this paper we present the definition of (s,t)- Strongly derivation pair and Jordan (s,t)- strongly derivation pair on a ring R, and study the relation between them. Also, we study prime rings, semiprime rings, and rings that have commutator left nonzero divisior with (s,t)- strongly derivation pair, to obtain a (s,t)- derivation. Where s,t: R®R are two mappings of R.
The sintering behavior of Alumina was investigated by adding TiO2. The addition of TiO2 lowered the sintering temperature of the Alumina compared with those of pure Alumina. The result suggests that TiO2 acts as an activator for sintering of Alumina. Water absorption, apparent porosity and density were examined for both pure and TiO2 added to Alumina samples. The variations of sintering behavior were discussed in terms of shrinkage, porosity, water absorption and density. Thermal shock resistance was also examined. In term of this work, the way of improving the thermal shock resistance in oxide- based materials by adding reactive Titania powder to the Alumina samples. The laboratory results showed an improvement in thermal shock resistance
... Show MoreClassification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traff
... Show More