The goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤e M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.
Abstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show Morethe behavior of the first-order black and gray solitons propagtedin optical fiber in the presence of frequency chirp is studied analytically and numerically results show that phase profile of black solitons changes abruptly
Background: Cancer is a lethal disease that results from a multifactorial process. Progression into carcinogenesis and an abnormal cell proliferation can occur due to the micro and macro environment as well as genetic mutations and modifications. In this review, cancer and the microbiota – mainly bacteria that inhabit the tumour tissue – have been discussed. The positive and negative impacts of the commensal bacteria on tumours being protective or carcinogenic agents, respectively, and their strategies have also been described. Methods: Related published articles written in English language were searched from Google Scholar, PubMed, Mendeley suggestions, as well as Google search using a combination of the keywords ‘Microbiota, commens
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreBromelain is a proteolytic enzyme rich in cysteine proteases, extracted from the stem and fruit of pineapple (Ananas comosus). There are several therapeutic applications of the bromelain enzyme, where it has anti-inflammatory, anti-cancer, and antimicrobial activity, reduces joint pain, and accelerates wound healing. In the current study, bromelain enzyme was loaded on silver nanoparticles (Br-AgNPs) prepared using the citrate-reduction Turkevich method. Different characterization analyses were performed, including UV-Vis spectrophotometers, FTIR, SEM, and XRD analyses. Moreover, the antioxidant activity of prepared Br-AgNPs was evaluated by DPPH assay. The results of UV-Vis showed a peak at 434 nm, which referred to the AgNPs f
... Show More