In this paper we generalize some of the results due to Bell and Mason on a near-ring N admitting a derivation D , and we will show that the body of evidence on prime near-rings with derivations have the behavior of the ring. Our purpose in this work is to explore further this ring like behavior. Also, we show that under appropriate additional hypothesis a near-ring must be a commutative ring.
Abstract
This study aims to identify the most prominent factors that lead to bullying of students with intellectual disabilities in primary and middle schools from the perspectives of special education teachers. A quantitative descriptive approach was utilized. A questionnaire was used as a tool for data collection. The sample consisted of (72) male and female teachers from the Asir region in the Kingdom of Saudi Arabia. The results revealed the most prominent factors that lead to bullying as follows: factors associated with the school and its policies, factors associated with peers, factors associated with students with intellectual disabilities, and factors associated with general education teachers. The findin
... Show MoreBackground and aim: Pomegranate is a medicinal herb that can promote healing of periodontal tissue through differentiation of mesenchymal cells both in vivo and in vitro. Therefore, this study is to investigate the effect of oral supplementation of Punicagranatum L. peel extract on bone defect in rabbit. Methods: Forty five male rabbits were divided into 3 groups; group 1; baseline group(5 rabbits) left without bone defect. Group 2; study group (20 rabbits) with bone defect model that received daily 1ml of oral supplementation of pomegranate peel extract (PoPx). Group 3; control group (20 rabbits) with bone defect model that received distilled water. Bone defect was done into facial plate of lower right central incisor. Blood biopsies by
... Show MoreDespite extensive investigations, an effective treatment for sepsis remains elusive and a better understanding of the inflammatory response to infection is required to identify potential new targets for therapy. In this study we have used RNAi technology to show, for the first time, that the inducible lysophosphatidylcholine acyltransferase 2 (LPCAT2) plays a key role in macrophage inflammatory gene expression in response to stimulation with bacterial ligands. Using siRNA- or shRNA-mediated knockdown, we demonstrate that, in contrast to the constitutive LPCAT1, LPCAT2 is required for macrophage cytokine gene expression and release in response to TLR4 and TLR2 ligand stimulation but not for TLR-independent stimuli. In addition, cells transfe
... Show MoreAmputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte
... Show MoreTow simple, rapid and sensitive spectrophotometric methods for the determination of mesalazine in pharmaceutical preparations have been carried out. The proposed methods depend on oxidative coupling reaction of mesalazine with m-aminophenol in the existence of N-bromosuccinamide in alkaline medium (method A) and 2,6-dihydroxybenzoic acid in the existence of sodium metaperiodate in basic medium (method B) to produce colored products , show highest absorptions at 640 (nm) and 515 (nm), alternately. Beer’s law was consistent in concentrations extent of 1.25-30 and 0.5-12.5 (µg.mL-1) with molar absorptivity of 0.36×104 and 0.77×104 L.mol-1.cm<
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show More