Abstract Throughout this paper R represents commutative ring with identity and M is a unitary left R-module, the purpose of this paper is to study a new concept, (up to our knowledge), named St-closed submodules. It is stronger than the concept of closed submodules, where a submodule N of an R-module M is called St-closed (briefly N ≤Stc M) in M, if it has no proper semi-essential extensions in M, i.e if there exists a submodule K of M such that N is a semi-essential submodule of K then N = K. An ideal I of R is called St-closed if I is an St-closed R-submodule. Various properties of St-closed submodules are considered.
The activation and reaction energies of the C-C and C-H bonds cleavage in pyrene molecule are calculated applying the Density Functional Theory and 6-311G Gaussian basis. Different values for the energies result for the different bonds, depending on the location of the bond and the structure of the corresponding transition states. The C-C bond cleavage reactions include H atom migration, in many cases, leading to the formation of CH2 groups and H-C≡C- acetylenic fragments. The activation energy values of the C-C reactions are greater than 190.00 kcal/mol for all bonds, those for the C-H bonds are greater than 160.00 kcal/mol. The reaction energy values for the C-C bonds range between 56.497 to 191.503 kcal/mol. As for the C-H cleavage rea
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Empirical equation has been presented to predict the optimum hydrodynamic
pressure gradient with optimum mud flow rate (one equation) of five Iraqi oil wells
to obtain the optimum carrying capacity of the drilling fluid ( optimum transport
cuttings from the hole to the surface through the annulus).
This equation is a function of mud flow rate, mud density and penetration
rate without using any charts or graphs.
The correlation coefficient accuracy is more than 0.9999.
The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreWaste is one of the most important problems affecting the city’s environment and its urban landscape, which results from the activities and activities of man and the natural environment. Its sources have varied between residential, commercial, industrial, medical and hazardous, and its spread in cities, on roads and on abandoned open lands, has led to significant negative effects and risks to human health and the environment.
Therefore, there were serious attempts to deal with waste and follow sequential steps that formed a waste management system such as (collection, sorting, transport, then treatment and disposal). Preventing and reducing waste, then recycling and recovering by composting or burning, and ending with bu
... Show MoreThe article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons
... Show MoreTerrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro
... Show MoreBackground: Cholera has been recognized as a killer disease since earliest time. The disease is caused by infection of the small intestine by Vibrio cholerae O1 and O1391 which is characterized by severe dehydrating diarrheal condition and is one disease in modern times that is epidemic, endemic and pandemic in nature. Objective: This study was carried out to detect and isolate V. cholerae from patients suffered from watery diarrhea, which may cause severe complications such as dehydration, shock followed by death. Materials and methods: stool specimens were collected from 308 patients with watery diarrhea. These samples were tested with many criteria such as TCBS agar, gram stain, biochemical tests and VITEK-2 system to improve the isolati
... Show MoreThe current study used extracts from the aloe vera (AV) plant and the hibiscus sabdariffa flower to make Ag-ZnO nanoparticles (NPs) and Ag-ZnO nanocomposites (NCs). Ag/ZnO NCs were compared to Ag NPs and ZnO NPs. They exhibited unique properties against bacteria and fungi that aren't present in either of the individual parts. The Ag-ZnO NCs from AV showed the best performance against E. coli, with an inhibition zone of up to 27 mm, compared to the other samples. The maximum absorbance peaks were observed at 431 nm and 410 nm for Ag NPs, at 374 nm and 377 nm for ZnO NPs and at 384 nm and 391 nm for Ag-ZnO NCs using AV leaf extract and hibiscus sabdariffa flower extract, respectively. Using field emission-scanning electron microscopes (FE-
... Show MoreA spectrophotometric method has been proposed for the determination of two drugs containing phenol group [phenylephrine hydrochloride (PHP) and salbutamol sulphate (SLB)] in pharmaceutical dosage forms. The method is based on the diazotization reaction of metoclopramide hydrochloride (MCP) and coupling of the diazotized reagent with drugs in alkaline medium to give intense orange colored product (?max at 470 nm for each of PHP and SLB). Variable parameters such as temperature, reaction time and concentration of the reactants have been analyzed and optimized. Under the proposed optimum condition, Beer’s law was obeyed in the concentration range of 1-32 and 1-14 ?g mL-1 for PHP and SLB, respectively. The limit of detection (LOD) and l
... Show More