n this paper , we prove that if T is a 2-torsion free triangular ring and be a family of additive mapping then satisfying is a higher centralizer which is means that is Jordan higher centralizer on 2-torsion free triangular ring if and only if is a higher centralizer and also we prove that if be a family of additive mapping satisfying the relation Σ , Then is a higher centralizer.
Abstract: To study the effect of nickel chloride on bone composition of mice, a number of biophysical and biochemical parameters have been made use. The animals were divided into control and experimental and further subdivided into three groups I, II and III according to the dose of nickel chloride (NiCl2) administered to them i.e. 5.8, 12.8 and 28.2 mg/kg body weight, respectively. Femur bones were obtained by sacrificing the animals three weeks after weaning them once a week. The percentage loss between the wet weight and dry weight of femur in control animals was found to be 32.5+1.5 .In the three experimental groups I,II and III, the percentage loss was 30.4+1.4, 35.3+2.3 and 38.9+2.2 respectively. The percentage loss between the wet we
... Show MoreThe adopted accelerated curing methods in the experimental work are 55ºC and 82ºC according to British standard methods. The concrete mix with the characteristics compressive strength of 35MPa is design according to the ACI 211.1, the mix proportion is (1:2.65:3.82) for cement, fine and coarse aggregate, respectively. The concrete reinforced with different volume fraction (0.25, 0.5 and 0.75)% of glass, carbon and polypropylene fibers. The experimental results showed that the accelerated curing method using 82ºC gives a compressive strength higher than 55ºC method for all concrete mixes. In addition, the fiber reinforced concrete with 0.75% gives the maximum compressive strength, flexural and splitting tensile strength for all types of
... Show MoreIn this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them
At the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system.
Lean accounting that has appeared as a response for change occurred of economic units adoption for changes occurred of economic units adoption for lean production instead of wide production system , has devised new performance measures suitable for economic units adoption for lean ideas: and helping in providing suitable information about evaluating economic unit performance , these measures are divided into three levels , cell level,value flow level , a
... Show MoreThe world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MoreFeature selection represents one of the critical processes in machine learning (ML). The fundamental aim of the problem of feature selection is to maintain performance accuracy while reducing the dimension of feature selection. Different approaches were created for classifying the datasets. In a range of optimization problems, swarming techniques produced better outcomes. At the same time, hybrid algorithms have gotten a lot of attention recently when it comes to solving optimization problems. As a result, this study provides a thorough assessment of the literature on feature selection problems using hybrid swarm algorithms that have been developed over time (2018-2021). Lastly, when compared with current feature selection procedu
... Show MoreAs we have said that the reasons for abortion are many and varied them to be for
the purpose of treatment or the protection of the mother of the loss or that the abortion
of an act intended purpose of birth control or other reasons is the statistics that are
spread in the world that about 50-60 million abortions annually in the world If this
abortion criminal who is loss of the lives of fetuses and a disgrace to the preachers to
the progressive and liberal, secular, and because they were not able to maintain
human life after leaving the obligation to approach Islam and because life support is
the highest things, which is one of the necessities of the five obligatory street
maintenance came verses warn those who un
Studied red beetle life on each of the yen and wheat durum wheat, barley, corn, rice, chickpeas, ground peanuts and beans in Living situation constant temperature and relative humidity of 65% for a period of 66 days was the life cycle of the insect different from one substance to another ....
The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More