Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
Due to the continuous development in society and the multiplicity of customers' desires and their keeping pace with this development and their search for the quality and durability of the commodity that provides them with the best performance and that meets their needs and desires, all this has led to the consideration of quality as one of the competitive advantages that many industrial companies compete for and which are of interest to customers and are looking for. The research problem showed that the Diyala State Company for Electrical Industries relies on some simple methods and personal experience to monitor the quality of products and does not adopt scientific methods and modern programs. The aim of this research is to desi
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreHTH Ali Tarik Abdulwahid , Ahmed Dheyaa Al-Obaidi , Mustafa Najah Al-Obaidi, eNeurologicalSci, 2023
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreRecently emerging pandemic SARS CoV-2 conquered our world since December 2019. Continuous efforts have been done to find out effective immunization and precise treatment stetratigies A way from therapeutic options that were tried in SARS CoV-2, an increased attention is directed to predict natural products and mainly phytochemicals as collaborative measures for this crisis. In this review, most of the mentioned compounds specially flavonoids (biacalin, hesperidin, quercetin, luteolin,, and phenolic (resveratrol, curcumin, and theaflavin) exert their effect through interfering with the action of one or more of this proteins (spike protein, papain like protease, 3 chymotrypsin like cysteine protease, and RNA dependent RNA
... Show MoreObjectives: To find out the effectiveness of education program application on nurses-midwives' knowledge toward prevention and management of postpartum hemorrhage in delivery room and some socio demographic characteristics Methodology: a quasi -experimental "test-retest"design has carried throughout the present study with the application of a pre –test and post- test for nurses-midwives' knowledge toward postpartum hemorrhage. The study was conducted in six hospitals in Baghdad: Fatima Al – Zahra for Maternity and Pediatric, Al -Elwia maternity, Baghdad Teaching, AL-Imamine Al - Kadhimin Teaching, Al-Karckh maternity and Al-Yarmouk Teaching hospital for the period from 27th May
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
The New Schiff base ligand 4,4'-[(1,1'-Biphenyl)-4,4'-diyl,bis-(azo)-bis-[2-Salicylidene thiosemicarbazide](HL)(BASTSC)and its complexes with Co(II), Ni(II), and Cu(II) were prepared and characterized by elemental analysis, electronic, FTIR, magnetic susceptibility measurements. The analytical and spectral data showed, the stiochiometry of the complexes to be 1:1 (metal: ligand). FTIR spectral data showed that the ligand behaves as dibasic hexadentate molecule with (N, S, O) donor sequence towards metal ions. The octahedral geometry for Co(II), Ni(II), and Cu(II) complexes and non electrolyte behavior was suggested according to the analysis data.