Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More
Students’ feedback is crucial for educational institutions to assess the performance of their teachers, most opinions are expressed in their native language, especially for people in south Asian regions. In Pakistan, people use Roman Urdu to express their reviews, and this applied in the education domain where students used Roman Urdu to express their feedback. It is very time-consuming and labor-intensive process to handle qualitative opinions manually. Additionally, it can be difficult to determine sentence semantics in a text that is written in a colloquial style like Roman Urdu. This study proposes an enhanced word embedding technique and investigates the neural word Embedding (Word2Vec and Glove) to determine which perfo
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreFurfural is a toxic aromatic aldehyde that can cause a severe environmental problem especially the wastewater drown from petroleum refinery units. In the present work, a useless by-product from local furniture manufacturing industry; sawdust was used as raw material for the preparation of activated carbon which is chemically activated with phosphoric acid. The effect of adsorption variables which include initial pH of solution (2-9), agitation speed (50-250) rpm, agitation time (15-120) min, initial concentration of furfural (50-250) ppm, and amount of adsorbent material (0.5-2.5) g for the three adsorbents used (prepared activated carbon, commercial activated carbon and raw sawdust) were investigated in a batch process
... Show MoreFree cement refractory concrete is a type of refractory concrete with replacing alumina cement by bonding materials such as white kaolin, red kaolin and fumed silica. The free cement refractory concrete used in many applications like Petrochemicals, iron furnaces and cement production industries. The research clarifies the effect of steel fibers with two types crimped steel fibers and hooked steel
fibers with percentages 0.5%, 1% and 1.5% by volume from weight of bauxite aggregates. The additions of steel fibers with two types gave good properties in high temperatures where the specimens keep the dimension without failure and the properties made the best. the percentage of increasing for thermal conductivity was 44% for 1.5% crimped
Scams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm
... Show More