This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a faithful act over S, where T is any bounded linear operator, if T is any bounded operator, then is separated, if is separated act over S, Then T is injective, if a basis K = {vj, j} for V, then every element w of can be composed as =(pn (T) + . v, for some v in V, and put T as similar to any operator from to and V as a finite dimensional normed space, then is Noetherian act over S if S is Noetherian.
The objective of the research was to evaluate consumer purchasing behavior through the Internet, such as consumer behavior, reasons for buying online, purchasing advantages over the Internet, personal variables (gender, age, marital status, education level, income, and income and job type). The questionnaire was adopted as a main tool in the survey of the views of a sample of consumers in Baghdad governorate (100) people and analyzed their answers using the statistical program SPSS in calculating the mean and standard deviation Centigrade, correlation coefficient (R) and test ( ). The main findings of the research were:
- There is a positive and positive relationship between consumer purchasing behavior via the Internet and
Objectives: To highlight the knowledge of Al-Kindy medical students regarding varicella infection and to assess their knowledge and attitude toward its prevention. Methodology: This descriptive cross-sectional study enrolled academic year 2020/2021 students at Al-Kindy College of Medicine from first to final year. We used an online questionnaire by Google forms to collect data, which were analyzed with SPSS 26. Results: A total of 208 students participated with 126 in the preclinical and 82 in the clinical grades. Generally, most clinical students were more aware about epidemiology, clinical manifestations, and complications of varicella infection than the preclinical students. Conclusion: Educational stage is a significant variab
... Show MoreObjectives: 1. Assessment women’s knowledge about caesarean section. 2. Determining women’s knowledge in relation to their demographic characteristics (age, level of education, and economic status). Methodology: A descriptive design was conducted on Assessment Women’ Knowledge about Cesarean Section at Maternity and Pediatric Hospital in AL-Samawa City. This study started from 26th of September 2020 up to 16th March 2021. Sample of (100) married women who were at reproductive age, pregnant (prime or multipara ) who were planned to have birth by elective cesarean section or had previous elective caesarian section without medical indication or women who had cesarean section with medical indication or emergency. Results: Results
... Show MoreObjectives: The current study aims to evaluate parents' knowledge towards diabetes mellitus (type I); to identify the association between parents' knowledge and their demographic characteristics; and to identify the association between parents' knowledge and demographic characteristics of their children. Methodology: Descriptive study carried out during the period from January to April 2015 on purposive sample of 100 parents with their children with diabetes mellitus who attending diabetes and endocrine treatment center. An evaluation tool is constructed by the researcher based on previous literature regarding
The tensions and crises and the psychological pressure as well as the rapid changes and great development which is taking place in the present time. And witnessing community of wars and conflicts that give rise to future concern among members of the community in general and students in particular, as it included the current research a number of chapters, the First chapter contains the research problem, the important goal, then set researcher terminology that has defined and contained in the title of research in the form (concern the future, artistic expression, middle school). The Second chapter included three sections, the first included the nature of adolescence and traits, characteristics and pr
... Show MoreBackground: Despite the importance of vaccines in preventing COVID-19, the willingness to receive COVID-19 vaccines is lower among RA patients than in the general population. Objective: To determine the extent of COVID-19 knowledge among RA patients and their attitudes and perceptions of COVID-19 vaccines. Methods: A qualitative study with a phenomenology approach was performed through face-to-face, individual-based, semi-structured interviews in the Baghdad Teaching Hospital, Baghdad, Iraq, rheumatology unit. A convenient sample of RA patients using disease-modifying anti-rheumatic drugs was included until the point of saturation. A thematic content analysis approach was used to analyze the obtained data. Results: Twenty-five RA pa
... Show MoreA method for Approximated evaluation of linear functional differential equations is described. where a function approximation as a linear combination of a set of orthogonal basis functions which are chebyshev functions .The coefficients of the approximation are determined by (least square and Galerkin’s) methods. The property of chebyshev polynomials leads to good results , which are demonstrated with examples.
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.