KE Sharquie, SA Al-Meshhadani, AA Al-Nuaimy, Saudi medical journal, 2007 - Cited by 9
Inspite of the renovation and development that occurred on the
mathematics curricula and its teaching styles (methods), the teaching methods and the evaluation styles that the teachers of the country
follow are still traditionaL It depends on the normal distribution approach and the principle of individual differences among students in
addition the traditional tests that are used to evaluate student achievement are built on standard-referenced system. These types of tests focus on comparing the student's performance with his peers'
performance. The limitary of this type of evaluation in diagnosing the
students' acquisition of the stu
... Show MoreGallstone disease is one of the most common complications among diabetic patients especially type 2 DM. Till now, there is no specific and certain factor that explain the incidence of gallstones among type 2 diabetic patients and many risk factors are taken collectively to estimate its intensity and severity compared to non diabetic counter parts. This clinical study was designed to evaluate and report the incidence and severity of gallstones among type 2 diabetics and non diabetics regarding certain factors. 20 diabetic females and 20 diabetic males were collected as patients′ group and have had gallstones while 20 females and 20 males who have had gallstones without diabetes mellitus type 2 were collected as controls′ group
... Show MoreThe title compound, [Ru3(μ3-NC6H4Br)2(CO)9], is a V-shaped triruthenium cluster, each side of the V being face-capped by a 4-bromophenylimide ligand. Each Ru atom is also ligated by three terminal carbonyl ligands. There are two molecules in the asymmetric unit with minor conformational differences.
Let be a commutative ring with identity. The aim of this paper is introduce the notion of a pseudo primary-2-absorbing submodule as generalization of 2-absorbing submodule and a pseudo-2-absorbing submodules. A proper submodule of an -module is called pseudo primary-2-absorbing if whenever , for , , implies that either or or . Many basic properties, examples and characterizations of these concepts are given. Furthermore, characterizations of pseudo primary-2-absorbing submodules in some classes of modules are introduced. Moreover, the behavior of a pseudo primary-2-absorbing submodul
... Show MoreLet R be a ring and let A be a unitary left R-module. A proper submodule H of an R-module A is called 2-absorbing , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H or rs∈[H:A], and a proper submodule H of an R-module A is called quasi-prime , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H. This led us to introduce the concept pseudo quasi-2-absorbing submodule, as a generalization of both concepts above, where a proper submodule H of an R-module A is called a pseudo quasi-2-absorbing submodule of A, if whenever rsta∈H,where r,s,t∈R,a∈A, implies that either rsa∈H+soc(A) or sta∈H+soc(A) or rta∈H+soc(A), where soc(A) is socal of an
... Show MoreOur aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule of an -module is called nearly primary-2-absorbing submodule if whenever , for , , , implies that either or or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.
NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
A (b,t)-blocking set B in PG(2,q) is set of b points such that every line of PG(2,q) intersects B in at least t points and there is a line intersecting B in exactly t points. In this paper we construct a minimal (b,t)-blocking sets, t = 1,2,3,4,5 in PG(2,5) by using conics to obtain complete arcs and projective codes related with them.