In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
It is well known that the wreath product is the endmorphism monoid of a free S-act with n-generators. If S is a trivial semigroup then is isomorphic to . The extension for to where is an independent algebra has been investigated. In particular, we consider is to be , where is a free left S-act of n-generators. The eventual goal of this paper is to show that is an endomorphism monoid of a free left S-act of n-generators and to prove that is embedded in the wreath product .
Background: Malignant lymphoma is a term that describes primary tumors of the lymphoreticular system, almost all of which arise from lymphocytes.MMP-1 is the most ubiquitously expressed interstitial collagenase, a subfamily of MMPs that cleaves stromal collagens. It is also called collagenase-1.TIMPs which inhibits MMP activity and thereby restrict extracellular matrix breakdown, TIMP-1 is a stromal factor that has a wide spectrum of functions in different tissues. Material and Methods: This study was performed on (68) formalin-fixed, paraffin-embedded blocks, histopathologically diagnosed as lymphoma (head and neck lesions). Immunohistochemical staining of MMP1and TIMP1 was performed on each case of the study sample. Results: The expressio
... Show MoreBackground: Thiopurines are essential medications in Acute Lymphoblastic Leukemia (ALL) treatment protocols as anti-cancer agents since long time; however, their use might result in unexpected toxicities in ALL children due to the low thiopurine S-methyltransferase (TPMT) activity, a major enzyme involved in 6- mercaptopurine metabolism, which strongly correlates to the genetic polymorphism of the TPMT gene in those patients.
Objective: To identify the most common TPMT polymorphisms in children with ALL and its frequencies.
Methods: A cross sectional study enrolling eighty-one ALL children receiving mercaptopurine drug during their maintenance course of treatment accordin
... Show MoreData security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreAbstract Ternary Silver Indium selenide Sulfur AgInSe1.8S0.2 in pure form and with a 0.2 ratio of Sulfur were fabricated via thermal evaporation under vacuum 3*10-6 torr on glasses substrates with a thickness of (550) nm. These films were investigated to understand their structural, optical, and Hall Characteristics. X-ray diffraction analysis was employed to examine the impact of varying Sulfur ratios on the structural properties. The results revealed that the AgInSe1.8S0.2 thin films in their pure form and with a 0.2 Sulfur ratio, both at room temperature and after annealing at 500 K, exhibited a polycrystalline nature with a tetragonal structure and a predominant orientation along the (112) plane, indicating an enhanced de
... Show MoreLet M be an R-module, where R is commutative ring with unity. In this paper we study the behavior of strongly hollow and quasi hollow submodule in the class of strongly comultiplication modules. Beside this we give the relationships between strongly hollow and quasi hollow submodules with V-coprime, coprime, bi-hollow submodules.
Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreBN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
There is no doubt that Jane Austen is one of the most studied authors of the late 18th and early 19th centuries. Her female characters have been extensively studied and they seem to have aroused much interest as manifestations of the conduct of their time. Her heroines have realized that there were many mistakes in the rules of conduct that controlled and restricted their behaviors. Thus, they have found no fault in correcting these mistakes, by behaving naturally without acting. Elizabeth Bennet the heroine of Pride and Prejudice and Marianne Dashwood of Sense and Sensibility are the chosen examples of that kind of women.
Somerset Maugham is known mainly as a novelist . This paper presents Maugham the dramatist . Many critics have found him a promising dramatist . He has written 30 plays , then he turns his back upon the theater and writes his autobiographical and most successful novel Of Human Bondage ( 1915) .
Maugham's writing is clear , precise , and simple . He is described as a realist who is keenly aware of human nature , its concentration and frustration . His only tragedy A Man of Honour is a play in 4 acts . This paper concentrates mainly on this play to show Maugham as a dramatist and to show his concept of " honour " .
&nb
... Show More