Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
The Audit evedances represent the reconciliation tools between the Financial data shown on financial statements, and the level of satisfaction level of the Auditor about these statements. According that, the Auditor try to achieve the highest quantity of These evidances, and the most satisfactive of it…, but that will be so hard sometimes, when the internal controlling system is not good, and when the Auditor had some satisfied evidences, but not sharp… So, this research comes to inspect the relation between the quantity, and the level of satisfaction, and argument to prove that evidences gives. This research assumes that getting enough evidences leads to reduce faults, improves the auditing operation, and avoids risks. The research
... Show MoreAt the beginning of the nineties increased responsibility of the auditor to the community as the demand for auditing the environmental performance for the economic units in addition to audit the financial performance. With the aim of preserving the environment and reducing the damagse as aresult of the negative effects of the activities of these units.
The researh deal with two sides the first one identifies the theoretical framework of the concept of environmental audits, requirements, methods, types of procedures, and duties of the auditor in conducting environmental audits. It also deals with the concept of the enviro
... Show MoreHouse 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi
The aim of this study is to utilize the electromembrane extraction (EME) system as a manner for effective removal of zinc from aqueous solutions. A novel and distinctive electrochemical cell design was adopted consisting of two glass chambers, a supported liquid membrane (SLM) housing a polypropylene flat membrane infused with 1-octanol and a carrier. Two electrodes were used, a graphite as anode and a stainless steel as cathode. A comprehensive examination of several influential factors including the choice of carrier, the applied voltage magnitude, the initial pH of the donor solution, and the initial concentration of zinc was performed, all in a concerted effort to ascertain their respective impacts on the efficiency of zinc elim
... Show MoreBackground: The repair of bone defects remains a major clinical challenge in dentistry. Bone is a highly vascularized tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. The health promotive , preventive, and curative properties of herbs were recognized by the ancient and the present pharmacist and physicians to form the theoretical foundations in Medicine. Objective: Immunohistochemistry of osteocalcin and histological study to prove that symphytum officinale oil when applied locally on generated bone defect healing in rat tibia, it was very effectiveness. Patients and Methods: 0ur study fourty male rats , weighting (250-350) grams ,aged (5 7)months ,was
... Show MoreABSTRACT : The restoration of bone continuity and bone union are complex processes and their success is determined by the effectiveness of osteosynthesis. The use of plants for healing purposes predates human history and forms the source of current modern medicine. This research was planned to study the histological and immunohisto-chemistry of osteocalcin to evaluate of effect of local application of lepidium sativum oilon healing of induced bone defect in rat tibia. In this study, fourty albino male rats, weighting (300-400) gram, aged (6-8) months, will be used under control conditions of temperature, drinking and food consumption. The animals will subject for a surgical operation of medial side of tibiae bone, in control group the bone
... Show MoreThe research aims to achieve a set of objectives, the most important of which is determining the extent to which the auditors of the research sample in the Federal Bureau of Financial Supervision adhere to the requirements of the quality control system according to the Iraqi Audit Manual No. The federal financial / research sample with the quality control system according to the Iraqi audit guide No. 7), and the researcher seeks to test the main research hypothesis and sub-hypotheses, and to achieve this, a questionnaire was designed by (Google Form) and distributed electronically to the elements of the research sample, Through the statistical package program (SPSS), the results of the questionnaire were analysed. In light of the applied
... Show MoreThis study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More