In this article, we introduce a class of modules that is analogous of generalized extending modules. First we define a module M to be a generalized ECS if and only if for each ec-closed submodule A of M, there exists a direct summand D of M such that is singular, and then we locate generalized ECS between the other extending generalizations. After that we present some of characterizations of generalized ECS condition. Finally, we show that the direct sum of a generalized ECS need not be generalized ECS and deal with decompositions for be generalized ECS concept.
This work evaluated the effect of Alpha, Gamma irradiation and Nd:YAG, He-Ne laser on Staphylococcus epidermidis and Leishmania tropica in vitro. The experiment included five replicate of S. epidermidis , L. tropica in vitro exposed to effect of Alpha , Gamma irradiation by 241Am isotopes , in two doses
In the current study, 2D seismic data in west An-Najaf (WN-36 line) were received after many steps of processing by Oil Exploration Company in 2018. Surface Consistent Amplitude Compensation (SCAC) was applied on the seismic data. The processing sequence in our study started by sorting data in a common mid-point (CMP) gather, in order to apply the velocity analysis using Interactive Velocity Analysis Application (INVA) with Omega system. Semblance of velocity was prepared to preform normal move-out (NMO) vs. Time. Accurate root mean square velocity (VRMS) was selected, which was controlled by flatness of the primary events. The resultant seismic velocity section for the study area shows that the veloci
... Show MoreThe study addresses the problem of stagnation and declining economic growth rates in Arab countries since the eighties till today after the progress made by these countries in the sixties of the last century. The study reviews the e
... Show MoreA 3D velocity model was created by using stacking velocity of 9 seismic lines and average velocity of 6 wells drilled in Iraq. The model was achieved by creating a time model to 25 surfaces with an interval time between each two successive surfaces of about 100 msec. The summation time of all surfaces reached about 2400 msec, that was adopted according to West Kifl-1 well, which penetrated to a depth of 6000 m, representing the deepest well in the study area. The seismic lines and well data were converted to build a 3D cube time model and the velocity was spread on the model. The seismic inversion modeling of the elastic properties of the horizon and well data was applied to achieve a corrected veloci
... Show MoreThe current research aims to identify the level of strategic orientation and its dimensions (vision, mission, goals, and values) in the Iraqi National Security Service (INSS). The researchers followed the descriptive analytical approach as one of the forms of analysis and organized scientific interpretation to describe a specific phenomenon or problem, adopting the form questionnaire being the main source in collecting data and preparing for this. Based on the program of the Statistical Package of Social Sciences (SPSS 26) to analyze the data and come up with the final research results to identify the opinions of the intended sample on the subject of research, and the questionnaire of (20) paragraphs included the search variable, and was
... Show MoreErbil city is located in the northern Iraq with a population of over one million people. Due to water crises farmers usually use wastewater and well water for the agricultural production. In this study six stations were designed to sample waste water and three from well water to define waste water and ground water characteristics. In this study, Residual Na+ Carbonate, Mg++ hazard, salinity hazard, Kelley index, %sodium, total hardness, permeability index, potential salinity, sodium adsorption ratio, and Irrigation Water Quality Index (IWQI) were determined. The order of average cation concentrations in water was Mg2+> Ca2+ > Na+ > K+. While the proportion of main
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More