This study aims to identify the level of students’ awareness at Imam Muhammad bin Saud University of the requirements of married life in the light of social changes and suggested methods to deepen this awareness (according to the Islamic educational vision) from their own perspective. In this study, the researcher used the descriptive approach with a survey research method, depending on questionnaires to collect data, which he applied to students of College of Sharia in Imam Muhammad bin Saud Islamic University, as well as, students in the fields of Sociology, Social Work, and Psychology in the College of Social Sciences. The findings of the study revealed that students are aware of the requirements of married life concerning mutual rights. In addition, female students are aware of the rights of both husband and wife. The level of awareness of the aforementioned is moderate; students have also shown a moderate level of awareness about dealing with matrimonial disputes. Female respondents are more aware than male respondents of the requirements of married life, the study has illustrated that there are no differences in awareness between married and unmarried students in this regard. Finally, the respondent’s field of study has no impact on the level of awareness of the requirements of married life. Moreover, this study indicated that the methods suggested deepening the awareness of students of the requirements of married life at Imam Muhammad bin Saud University in the light of social changes (in accordance with Islamic Education) from their own perspective have gained a moderate degree of approval.
Our aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule of an -module is called nearly primary-2-absorbing submodule if whenever , for , , , implies that either or or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.
Starting from bis (4,4'-diamino phenoxy) ethan(1), a variety of phenolicschiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis, some derivatives evaluated by thermal analysis (TGA).
Let R be a commutative ring with identity . In this paper we study the concepts of essentially quasi-invertible submodules and essentially quasi-Dedekind modules as a generalization of quasi-invertible submodules and quasi-Dedekind modules . Among the results that we obtain is the following : M is an essentially quasi-Dedekind module if and only if M is aK-nonsingular module,where a module M is K-nonsingular if, for each , Kerf ≤e M implies f = 0 .
This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting
... Show MoreLet R be a ring and let A be a unitary left R-module. A proper submodule H of an R-module A is called 2-absorbing , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H or rs∈[H:A], and a proper submodule H of an R-module A is called quasi-prime , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H. This led us to introduce the concept pseudo quasi-2-absorbing submodule, as a generalization of both concepts above, where a proper submodule H of an R-module A is called a pseudo quasi-2-absorbing submodule of A, if whenever rsta∈H,where r,s,t∈R,a∈A, implies that either rsa∈H+soc(A) or sta∈H+soc(A) or rta∈H+soc(A), where soc(A) is socal of an
... Show MoreIn this paper, the problem of scheduling jobs on one machine for a variety multicriteria
are considered to minimize total completion time and maximum late work. A set of n
independent jobs has to be scheduled on a single machine that is continuously available from
time zero onwards and that can handle no more than one job at a time. Job i,(i=1,…,n)
requires processing during a given positive uninterrupted time pi, and its due date d
i.
For the bicriteria problems, some algorithms are proposed to find efficient (Pareto)
solutions for simultaneous case. Also for the multicriteria problem we proposed general
algorithms which gives efficient solutions within the efficient range
134 samples of plants and animals wastes were taken from three different regions outside Baghdad and three different regions in Baghdad. 24 cellulolytic isolates fungi AO, C1, TH1, AN1, R1, TV, PG, AF, B1, L1, AP, TH, AP1, AN3, AO2, A, A1, C, F, AO1, C2, F1, CL and AP2 independent were chosen out of 48 selected fungi. The best optimal conditions for growth were 30ºC and pH 7. The isolates were identified and screened according to the colony diameter, biomass and density of spores in addition of capability to produce the hydrolytic enzymes for cellulose.
Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreLet be an associative ring with identity and let be a unitary left -module. Let be a non-zero submodule of .We say that is a semi- - hollow module if for every submodule of such that is a semi- - small submodule ( ). In addition, we say that is a semi- - lifting module if for every submodule of , there exists a direct summand of and such that
The main purpose of this work was to develop the properties of these classes of module.
In this paper, the combined source coding with Multi Carrier Code Division Multiple Access (MC-CDMA) system is proposed, where the transmission of the compressed image produced from source coding through Additive White Gaussian Noise (AWGN) channel for a single user and multi users. In which the (MC-CDMA) system removes Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI). The hybrid compression system of Discrete Cosine Transform (DCT) and predictive coding (PC) technique are integrated as a source coding. The simulation results indicates that the transmission system of a single user was much better than the transmission system of multi users. When the number of users increased, the Bit Error Rate (BER) increased. For a
... Show More