In previous our research, the concepts of visible submodules and fully visible modules were introduced, and then these two concepts were fuzzified to fuzzy visible submodules and fully fuzzy. The main goal of this paper is to study the relationships between fully fuzzy visible modules and some types of fuzzy modules such as semiprime, prime, quasi, divisible, F-regular, quasi injective, and duo fuzzy modules, where under certain conditions it has been proven that each fully fuzzy visible module is fuzzy duo. In addition, there are many various properties and important results obtained through this research, which have been illustrated. Also, fuzzy Artinian modules and fuzzy fully stable modules have been introduced, and we study the relationships between these kinds of modules and fully fuzzy visible modules. Many other intersecting results we found.
Endometriosis, an autoimmune disease is among one of the most challenging of the 21 st century that affects women in reproductive age. The aim of the present study is to highlight the role of IL-36γ, and its relationship with other cytokines (Ang-2 and TNF-α) in the pathogenesis of endometriosis . Seventy five (75) consecutive women patient of reproductive age (25-40) years were enrolled in this study , Patients were divided into three groups , group 1 (G1) included (25) newly diagnosed endometriotic patients , that were not given any treatment related to Gynecology or anti-inflammatory medications . Second group : group 2 (G2) consists of (25) endometriotic patient who were treated with zoladex
... Show MoreBackground: Polycystic ovarian syndrome (PCOS) is one of the most common cause of anovulation during reproductive life.Resistin can increase ovarian androgen production by directly stimulating ovarian theca cell or indirectly by augmenting pancreatic – B cell production of insulin.
Patients and Methods: Sixty patients with PCOS who were non diabetic and not taking any medicine for the last three months were involved in the study .Thirty normal fertile female serves as control group. Fasting blood samples were aspirated from all individuals from 3rd - 6th day of the menstrual cycle to measure resistin, insulin, glucose, LH, FSH, TT3, TT4, Prolactin , Total Testosterone and lipid profile, by ELISA and rou
This study was conducted in Baghdad, Iraq from December 2021 to May 2022. The goal was to determine the effect of Toxoplasma gondii on liver function by examining the relationship between Toxoplasma infection and hormones. One hundred and twenty male patients with Chronic liver disease (CLD) (age:14-75 years) and 120 control males (age: 24-70 years) participated in this study. Serum samples were taken from all individuals and were then analysed for anti-Toxoplasma antibodies. Hormonal tests were conducted for all participants which included (Cortisol, testosterone, prolactin, insulin, and thyroid-stimulating hormone TSH). Biochemical tests included (Prothrombin time PT, international normalized ratio INR and albumin); liver enzymes
... Show MoreThe importance of topology as a tool in preference theory is what motivates this study in which we characterize topologies generating by digraphs. In this paper, we generalized the notions of rough set concepts using two topological structures generated by out (resp. in)-degree sets of vertices on general digraph. New types of topological rough sets are initiated and studied using new types of topological sets. Some properties of topological rough approximations are studied by many propositions.
Some authors studied modules with annihilator of every nonzero submodule is prime, primary or maximal. In this paper, we introduce and study annsemimaximal and coannsemimaximal modules, where an R-module M is called annsemimaximal (resp. coannsemimaximal) if annRN (resp. ) is semimaximal ideal of R for each nonzero submodule N of M.
Samples of gasoline engine oil (SAE 5W20) that had been exposed to various oxidation times were inspected with a UV-Visible (UV-Vis) spectrophotometer to select the best wavelengths and wavelength ranges for distinguishing oxidation times. Engine oil samples were subjected to different thermal oxidation periods of 0, 24, 48, 72, 96, 120, and 144 hours, resulting in a range of total base number (TBN) levels. Each wavelength (190.5 – 849.5 nm) and selected wavelength ranges were evaluated to determine the wavelength or wavelength ranges that could best distinguish among all oxidation times. The best wavelengths and wavelength ranges were analyzed with linear regression to determine the best wavelength or range to predict oxidation t
... Show MoreThe research aims to evaluate the suppliers at Diyala general electric industries company conducted in an environment of uncertainty and fuzzy where there is no particular system followed by the company, and also aims to use the problem of traveling salesman problem in the process of transporting raw materials from suppliers to the company in a fuzzy environment. Therefore, a system based on mathematical methods and quantity was developed to evaluate the suppliers. Fuzzy inference system (FIS) and fuzzy set theory were used to solve this problem through (Matlab) and the problem of the traveling salesman in two stages was also solved by the first stage of eliminating the fuzzing of the environment using the rank function method, w
... Show MoreThe idea of ech fuzzy soft bi-closure space ( bicsp) is a new one, and its basic features are defined and studied in [1]. In this paper, separation axioms, namely pairwise, , pairwise semi-(respectively, pairwise pseudo and pairwise Uryshon) - fs bicsp's are introduced and studied in both ech fuzzy soft bi-closure space and their induced fuzzy soft bitopological spaces. It is shown that hereditary property is satisfied for , with respect to ech fuzzy soft bi-closure space but for other mentioned types of separations axioms, hereditary property satisfies for closed subspaces of ech fuzzy soft bi-closure space.
This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show More