In this paper, we introduce the concept of s.p-semisimple module. Let S be a semiradical property, we say that a module M is s.p - semisimple if for every submodule N of M, there exists a direct summand K of M such that K ≤ N and N / K has S. we prove that a module M is s.p - semisimple module if and only if for every submodule A of M, there exists a direct summand B of M such that A = B + C and C has S. Also, we prove that for a module M is s.p - semisimple if and only if for every submodule A of M, there exists an idempotent e ∊ End(M) such that e(M) ≤ A and (1- e)(A) has S.
is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines
... Show MoreSome necessary and sufficient conditions are obtained that guarantee the oscillation of all solutions of two types of neutral integro-differential equations of third order. The integral is used in the sense of Riemann-Stieltjes. Some examples were included to illustrate the obtained results
Watermelon has been reported to be vulnerable to insect pest pressure throughout its growth stages with a resultant indiscriminate calendar-based insecticide application (of up to 25 sprays/season in the study area), with its attendant consequences. In order to recommend the crop growth period(s) to effect chemical control measures that will give better return on investment, field trials were set-up in the early- and late-cropping seasons of 2016 and 2017. Forty, 5m long x 8m wide plots were demarcated in randomized complete block design in 4 replications. Treatments were applications of 0.5% Cyper-diforce® (Cypermethrin 30g/L + Dimethoate 250g/L) at seedling, mid-vegetative, mid-flowering, mid-frui
... Show MoreThe main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free
... Show MoreFirst principle calculations are performed to theoretically predict the physical properties of hexagonal aluminium arsenide planar and buckled monolayers. The structural characteristics showed that the buckled parameter is about 0.32 A°. Cohesive energies have favourable values and it indicates the fabrication possibility. Phonon dispersion properties indicated that the planar aluminium arsenic monolayers are dynamically unstable, while the buckled is less dynamically unstable. The elastic constant parameters achieved the required characteristics of stable hexagonal monolayer structures. The study of electronic band structure prefers to indirect semiconductor band gaps, and the density of states showed strong orbital hybridizati
... Show MoreIn paper, we study the impact of the rotationn inclined magnetic felid and inclined symmetric channel with slip condition on peristaltic transport using incompressible non-Newtonian fluid. Slip conditions for the concentration and heat transfer are considered. We use the conditions on the fluid, namely infinite wavelength and low - Reynolds number to simplify the governed equations that described - motion flow, energy and concentration. These equations ofroblem are solved by the perturbation technique and restricted the number of Bingham to a small value to find the final expression of the stream function. The Bingham number, Brinkman number, Soret number, Dufour number, temperature, Hartman number and other parameters are teste
... Show MoreSerious gases have been highly related to being prejudiced against human life within the environment. The evolution of a trustworthy gas sensor with an elevated response is of major importance for detecting various hazardous gases. Titanium dioxide (TiO2) nanotubes (TNTs) are favorable candidates with considerable potential and stellar performance in gas sensor applications. In this work, we have studied the effect of voltage on preparing TiO2 nanotubular arrays via the anodization technique for gas sensor applications. A simple electrochemical anodization approach was used to synthesize titanium dioxide nanotubes. Diverse techniques of characterization were used to evaluate TNTs. The results gained from fi
... Show MoreIn today's world, digital image storage and transmission play an essential role,where images are mainly involved in data transfer. Digital images usually take large storage space and bandwidth for transmission, so image compression is important in data communication. This paper discusses a unique and novel lossy image compression approach. Exactly 50% of image pixels are encoded, and other 50% pixels are excluded. The method uses a block approach. Pixels of the block are transformed with a novel transform. Pixel nibbles are mapped as a single bit in a transform table generating more zeros, which helps achieve compression. Later, inverse transform is applied in reconstruction, and a single bit value from the table is rem
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThe use of online social network (OSN) has become essential to humans' lives whether for entertainment, business or shopping. This increasing use of OSN motivates designing and implementing special systems that use OSN users' data to provide better user experience using machine learning and data mining algorithms and techniques. One system that is used extensively for this purpose is friend recommendation system (FRS) in which it recommends users to other users in professional or entertaining online social networks.
For this purpose, this study proposes a novel friend recommendation system, namely Hybrid Friend Recommendation (FR) model. The Hybrid model applies dual-stage methodology on unlabeled data of 1241 users collected fro
... Show MoreWe report the influence of different glycine-to-nitrate ratios on the physical and magnetic properties for synthesized zinc-ferrite by microwave-assisted combustion route. Phase impurity and surface morphology investigated with XRD analysis and field emission- scanning electron microscopy, indicated that spinel structure were formed.Average particles size increased with the decrease of glycine to nitrate ratio. Magnetic measurement results indicated that high values of saturation magnetization were produced with low glycine/nitrate ratio. Optical properties of the investigated ferrites exhibited photo absorption from UV to visible region with
... Show MoreThis work highlights the estimation of the Al-Khoser River water case that disposes of its waste directly into the Tigris River within Mosul city. Furthermore, the work studies the effects of environmental and climate change and the impact of pollution resulting from waste thrown into the Al-Khoser River over the years. Al-Khoser River is located in the Northern Mesopotamia of Mosul city. This study aims to detect the polluted water area and the polluted surrounding area. Temporal remote sensing data of different Landsat generations were considered in this work, specifically Enhanced Thematic Mapper Plus of 2000 and Operational Land Imager of 2015. The study aims to measure the amount of pollution in the study area over 15 years
... Show MoreIn this work, an organic semiconductor of copper (II) phthalocyanine (CuPc) and Tris(8-hydroxyquinoline) aluminum (III) (Alq3) were entirely dissolved in chloroform with various mixing ratios (1:0,0.75:0.25,0.5:0.5,0.25:0.75,0:1) (w/w) to make thin films. They were deposited on a pre-cleaned glass using a spin-coating process and heat-treated at 473 K in vacuum. X-ray diffraction and a scanning electron microscope were used to investigate the films. XRD analysis reveals that CuPc/Alq3 composites have a polymorphic structure, with the exception of Alq3's amorphous structure, the crystallinity increases after annealing, but decreases when the concentration of Alq3 is increased. The quantity of (CuPc) rod-like structure and (Alq3) grain-lik
... Show MoreThe present work aimed to synthesize new phenol resins via incorporation of structural modification through introducing new phenolic compounds containing cyclic imide moiety in reaction with formaldehyde. The synthesis of these new resins involved three steps. First, one of the three N-(hydroxyphenyl)tetrabromophtalamic acids 1-3 were processed via a reaction between tetrabromophthalic anhydride and aminophenols. Amic acids 1-3 were dehydrated in the second step by smelting, producing the identical N-(hydroxyphenyl)tetrabromophthalimides 4-6. The new imides represent the new phenolic component
... Show MoreIn this research, the effect of the rotation variable on the peristaltic flow of Sutterby fluid in an asymmetric channel with heat transfer is investigated. The modeling of mathematics is created in the presence of the effect of rotation, using constitutive equations following the Sutterby fluid model. In flow analysis, assumptions such as long wave length approximation and low Reynolds number are utilized. The resulting nonlinear equation is numerically solved using the perturbation method. The effects of the Grashof number, the Hartmann number, the Hall parameter, the magnetic field, the Sutterby fluid parameter, and heat transfer analysis on the velocity and the pressure gradient are analyzed graphically. Utilizing MATHEMATIC
... Show MoreThis study was done to find the potential renal protective effects of sildenafil and its underlying mechanisms in mice with adenine-induced CKD. For the experiment, 40 male mice were split into four groups. The control group (A) received the same food without medication until the research ends, while the other three collections (B, C, and D) were given adenine (0.25% w/w in feed daily for 8 weeks), groups (C and D) were given sildenafil (0.5 and 2.5 mg/kg) respectively orally every day for 30 days, and then blood samples were taken to assess the function of the kidneys (Urea, total protein, and creatinine), total antioxidant capacity (TAC), superoxide dismutase (SOD), and catalase (CAT) in addition to kidney histopathology, as w
... Show MoreThe time fractional order differential equations are fundamental tools that are used for modeling neuronal dynamics. These equations are obtained by substituting the time derivative of order where , in the standard equation with the Caputo fractional formula. In this paper, two implicit difference schemes: the linearly Euler implicit and the Crank-Nicolson (CN) finite difference schemes, are employed in solving a one-dimensional time-fractional semilinear equation with Dirichlet boundary conditions. Moreover, the consistency, stability and convergence of the proposed schemes are investigated. We prove that the IEM is unconditionally stable, while CNM is conditionally stable. Furthermore, a comparative study between these two s
... Show MoreThis article reviews a decade of research in transforming smartphones into smart measurement tools for science and engineering laboratories. High-precision sensors have been effectively utilized with specific mobile applications to measure physical parameters. Linear, rotational, and vibrational motions can be tracked and studied using built-in accelerometers, magnetometers, gyroscopes, proximity sensors, or ambient light sensors, depending on each experiment design. Water and sound waves were respectively captured for analysis by smartphone cameras and microphones. Various optics experiments were successfully demonstrated by replacing traditional lux meters with built-in ambient light sensors. These smartphone-based measurement
... Show MoreIn this paper, we introduce the notion of a 2-prime module as a generalization of prime module E over a ring R, where E is said to be prime module if (0) is a prime submodule. We introduced the concept of the 2-prime R-module. Module E is said to be 2-prime if (0) is 2-prime submodule of E. where a proper submodule K of module E is 2-prime submodule if, whenever rR, xE, E, Thus xK or [K: E].
In this study, the electron energy distribution function (EEDF), the electron swarm parameters , the effective ionization coefficients, and the critical field strength (dielectric strength) in binary He-H2 gas mixture which is used as cryogenic for high-temperature superconducting power applications, are evaluated using two-term solution of the Boltzmann equation over the range of E/N ( the electric field to gas density) from 1 to 100 Td ( 1 Td=10-17 Vcm2) at temperature 77 K and pressure 2MPa, taking into account elastic ( momentum transfer) and inelastic cross-sections. Using the electron energy distribution function (EEDF) electron swarm parameters (electron drift velocity, mean electron e
... Show MoreApproximately 15% of all couples all over the world suffer from difficulty conceiving their first child. The word "infertility" is used to describe this problem.
When a couple had regular, unprotected sexual intercourse for a year or longer, it indicates that they have been unsuccessful in their efforts to conceive.
The current investigation aims to find out if there is a relationship between PROTAMIN-1(PRM-1) and INTERLEUKINE-12 (IL-12) gene expressions and their effect on the development of infertility. The current investigation comprised 100 teratozoospermia patients and 100 healthy fertile controls who had their semen examined. Samples were given by Al-Nahrain University's Biotech
... Show MoreIn this study, an industrial source) E-Glass fiber) and a natural source (chestnut filler) were combined to improve the properties of polyesters. Hand-layup technique was applied in this work. Polyester (UPE) were reinforced with E-glass fibers, then reinforced with nano chestnut particles. All composites were prepared with (10% wt.) of E-glass for all prepared sheet and this ratio applied for Nano chestnut composite to preparing nano hybrid composites, Nano chestnut particles were used to reinforce E-glass/UPE composites with weight ratio (3%, 6% and 9% wt.). The evaluated mechanical performances for E-glass/NCSP polyester composite were tensile strength, impact strength and hardness. The higher ultimate tensile strength, Y
... Show MoreForeign Object Debris (FOD) is defined as one of the major problems in the airline maintenance industry, reducing the levels of safety. A foreign object which may result in causing serious damage to an airplane, including engine problems and personal safety risks. Therefore, it is critical to detect FOD in place to guarantee the safety of airplanes flying. FOD detection systems in the past lacked an effective method for automatic material recognition as well as high speed and accuracy in detecting materials. This paper proposes the FOD model using a variety of feature extraction approaches like Gray-level Co-occurrence Matrix (GLCM) and Linear Discriminant Analysis (LDA) to extract features and Deep Learning (DL) for classifi
... Show MoreLet be a commutative ring with 1 and be a left unitary . In this paper, the generalizations for the notions of compressible module and retractable module are given.
An is termed to be semi-essentially compressible if can be embedded in every of a non-zero semi-essential submodules. An is termed a semi-essentially retractable module, if for every non-zero semi-essentially submodule of an . Some of their advantages characterizations and examples are given. We also study the relation between these classes and some other classes of modules.
The microwave induced plasma jet (MIPJ) system was built using local materials and based on a tapered waveguide. The parameters of this plasma were determined like electron temperature Te, electron density ne. the other parameters such as plasma frequency( fp), the Debye length( λD), and the number of particles in the Debye sphere( Nd) It has also been studied. The study were done at different Ar flow rate ranging from (2-10) l/m and a discharge tube diameter ranging from (2-10) mm. all of these parameters were determined depending on the MIPJ spectrum. it turned out that there is a high possibility of controlling the parameters of MIPJ through manipulating these parameters.
The purpose behind this paper is to discuss nanoparticles effect, porous media, radiation and heat source/sink parameter on hyperbolic tangent nanofluid of peristaltic flow in a channel type that is asymmetric. Under a long wavelength and the approaches of low Reynolds number, the governing nanofluid equations are first formulated and then simplified. Associated nonlinear differential equations will be obtained after making these approximations. Then the concentration of nanoparticle exact solution, temperature distribution, stream function, and pressure gradient will be calculated. Eventually, the obtained results will be illustrated graphically via MATHEMATICA software.
The question asked by all researchers is when solar panels will replace the national grid, especially in the domestic sector. In this study, a rooftop stand-alone solar electric system is designed to provide all the electrical power to a house in Baghdad-Iraq, using a (How to design PV system) simulation program. The feasibility of this system compared to the performance of the national electric grid and the system of private diesel generators is determined. The proposed solar system capacity is (25 kW), and the space required and the energy payback time are (360 m2 and 7.82 years), respectively. By using the current system, the net CO2 mitigation amount is 499,518.2 tons for 30-year. The kilowatt-hour cost
... Show MoreElliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi
... Show More