Let R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.
Transformation and many other substitution methods have been used to solve non-linear differential fractional equations. In this present work, the homotopy perturbation method to solve the non-linear differential fractional equation with the help of He’s Polynomials is provided as the transformation plays an essential role in solving differential linear and non-linear equations. Here is the α-Sumudu technique to find the relevant results of the gas dynamics equation in fractional order. To calculate the non-linear fractional gas dynamical problem, a consumer method created on the new homotopy perturbation a-Sumudu transformation method (HP TM) is suggested. In the Caputo type, the derivative is evaluated. a-Sumudu homotopy pe
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreThe aim of the present research is to investigate the effecting of pH parameter on the feasibility of lead removal from simulated wastewater using an electrochemical system. Electrocoagulation method is one of electrochemical technology which is used widely to treat industrial wastewater. Parameters affecting this operation, such as initial metal concentration, applied current, stirrer speed, and contact time of electroprocessing were taken as 155ppm, 1.5 Ampere, 150 rpm, 60 minutes respectively. While pH of the simulated wastewater was in the range of 2 to 12 in the experiments. It was found from the results that pH is an important parameter affecting lead removal operation. The best value of pH parameter is appro
... Show MorePDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2023
The purpose of this paper is to study the instability of the zero solution of some type of nonlinear delay differential equations of fifth order with delay by using the Lyapunov-Krasovskii functional approach, we obtain some conditions of instability of solution of such equation.
The aim of the current study is to demonstrate the effect of honey on the sperms characteristics (sperm concentration, sperm motility, grade of activity and sperm normal morphology) as well as pregnancy rate in mice. Sperms were obtained from caudal epididymis of male mice and prepared by adding10% of honey to the IVF medium using direct sperms activation technique for 30 minute incubation period before artificial insemination.
The study revealed a significant (P > 0.05) increase in active sperm motility (grade A and grade B) 49% and pregnancy rate 53.3% in female mice artificially inseminated with sperms. On the other hand, there were no significant differences in sperm con
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More