Inˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.
The study seeks to investigate the effect of Dunn Dunn learning style model on students’ achievement. Besides, the way of developing students’ deductive thinking by testing the null hypothesis: there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05). Additionally, there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05) on testing developing deductive thinking skills. The researcher adopted a quasi-experimental posttest
... Show MoreBiaxial hollow slab is a reinforced concrete slab system with a grid of internal spherical voids included to reduce the self-weight. This paper presents an experimental study of behavior of one-way prestressed concrete bubbled slabs. Twelve full-scale one-way concrete slabs of (3000mm) length with rectangular cross-sectional area of (460mm) width and (150mm) depth. Different parameters like type of specimen (solid or bubbled slabs), type of reinforcement (normal or prestress), range of PPR and diameter of plastic spheres (100 or 120mm) are considered. Due to the using of prestressing force in bubbled slabs (with ratio of plastic sphere diameter D to slab thickness H, D/H=0.67), the specimens showed an increase in ultimat
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThe present investigation considers the effect of curing temperatures (30, 40, and 50˚C) and curing compound method on compressive strength development of high performance concrete, and compares the results with concrete cured at standard conditions and curing temperature (21˚C). The experimental results showed that at early ages, the rate of strength development at high curing temperature is greater than at lower curing temperature, the maximum increasing percentage in compressive strength is 10.83% at 50C˚ compared with 21C˚ in 7days curing age. However, at later ages, the strength achieved at higher curing temperature has been less, and the maximum percentage of reduction has been 5.70% at curing temperature 50C˚ compared with 21
... Show MoreThis study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More
Students’ feedback is crucial for educational institutions to assess the performance of their teachers, most opinions are expressed in their native language, especially for people in south Asian regions. In Pakistan, people use Roman Urdu to express their reviews, and this applied in the education domain where students used Roman Urdu to express their feedback. It is very time-consuming and labor-intensive process to handle qualitative opinions manually. Additionally, it can be difficult to determine sentence semantics in a text that is written in a colloquial style like Roman Urdu. This study proposes an enhanced word embedding technique and investigates the neural word Embedding (Word2Vec and Glove) to determine which perfo
... Show More