E-commerce is the most important result of information technology in this day and age, has resulted in the use of commercial transactions to changes in economic, social, and psychological, and produced a new type of shopping, jobs, and create new job opportunities, and changed the traditional work environment. The challenge currently facing economic units is how to transfer this technology and its integration within the community, especially after the massive developments that have occurred in the areas of commercial and congested markets units, the economic and the products and services the many and varied and intensified competition among these units to achieve a profit, leading to the emergence of e-commerce as one of the means of modern trade which has affected and dramatically change the future of the business and initiated through what made possible by means of information technology to facilitate the buying and selling process electronically, which led to increase the efficiency of the performance of economic units and strengthen the competitive position of her, also contributed through its vital role in the marketing of products and services that Units electronically to facilitate the process of obtaining those products and services by customers and within the area of geographical area and wide at the time and the speed limit and reduce the cost of marketing products and services for those units to a minimum, so it will be highlighted in this paper on the importance of e-commerce, information technology and the impact of integration with each other in reducing both the cost of producing goods and services and the costs of marketing and reflection so effective when adopted by the economic units in the rationalization of pricing decisions to achieve customer satisfaction and meet the desires and in the last analysis to strengthen the competitive position of those units in the business environment in line with the challenges of successive in all areas performance of information technology in today's world.
Graceful labeling of a graph with q edges is assigned the labels for its vertices by some integers from the set such that no two vertices received the same label, where each edge is assigned the absolute value of the difference between the labels of its end vertices and the resulting edge labeling running from 1 to inclusive. An edge labeling of a graph G is called vertex anntimagic, if all vertex weights are pairwise distinct, where the vertex weight of a vertex under an edge labeling is the sum of the label of all edges incident with that vertex. In this paper, we address the problem of finding graceful antimagic labelin for split of the star graph , graph, graph, jellyfish graph , Dragon graph , ki
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
In the current study, different concentrations of miltefosine drug, which is the first effective and safe oral treatment for visceral leishmaniasis, was evaluated against L. donovani promastigotes in comparison with pentosam drug. Direct counting microscopic assay was used to find 50% inhibitory concentration (IC50) of miltefosine and pentostam against L. donovani promastigotes. The IC50 of miltefosine drug was 45.42μg/ml, 46.76μg/ml and 36.68μg/ml after 24 hr, 48hr and 72hr respectively, In comparison with IC 50 of pentostam drug was 75.39 μg/ml after 72hr. There were significant differences (P˂0.05) between IC50 values of miltefosine and pentostam drugs from first day to third day.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThe new type of paranormal operators that have been defined in this study on the Hilbert space, is paranormal operators. In this paper we introduce and discuss some properties of this concept such as: the sum and product of two paranormal, the power of paranormal. Further, the relationships between the paranormal operators and other kinds of paranormal operators have been studied.
The palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.
Background : Knee flexors tightness has been documented in apparently healthy adults and in those with musculoskeletal problems, but the influence of age on the tightness has not been studied in Iraq. This study was therefore designed to determine the influence of age on knee flexors tightness in apparently healthy subjects.Methods: Knee flexors tightness was measured using the active knee extension test (AKET) in 200 apparently healthy male and female subjects, aged 13 to 59 years. The subjects were recruited into 5 age groups using the purposive sampling technique.Knee flexors tightness was compared across the age groups using one-way analysis ofvariance (ANOVA). The independent t-test was used to compare knee flexors tightness on both
... Show MoreIn this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.
A space X is named a πp – normal if for each closed set F and each π – closed set F’ in X with F ∩ F’ = ∅, there are p – open sets U and V of X with U ∩ V = ∅ whereas F ⊆ U and F’ ⊆ V. Our work studies and discusses a new kind of normality in generalized topological spaces. We define ϑπp – normal, ϑ–mildly normal, & ϑ–almost normal, ϑp– normal, & ϑ–mildly p–normal, & ϑ–almost p-normal and ϑπ-normal space, and we discuss some of their properties.
In this paper we study the concepts of δ-small M-projective module and δ-small M-pseudo projective Modules as a generalization of M-projective module and M-Pseudo Projective respectively and give some results.