The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
In this research, an organobentonite (HDTMA-BT) was prepared by modifying a jordanian bentonite (BT) with hexadecyltrimethylammonium bromide. By means of in situ free radical polymerization in THF with AIBN as the initiator, this organobentonite is used to prepare the polymethylmethacrylate-bentonite (PMA-HDTMA-BT) nanocomposite. Scanning electron microscopy (SEM), x-ray diffraction (XRD), energy dispersive spectrometer (EDS) and Fourier transform infrared (FTIR) spectroscopy were used to characterize both HDTMA-BT and PMA-HDTMA-BT. Those adsorbents were used in a batch process to remove Pb(II), Cr(III) ions, and p-chlorophenol (PCP) from aqueous solution. Investigated factors included adsorbent dosage, initial pH solution, contact time, an
... Show MoreThe topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreThe efficient removal of dissolved organic compounds (DOC) from wastewater has become a major environmental concern because of its high toxicity even at low concentrations. Therefore, a technique was needed to reduce these pollutants. Ion exchange technology (IE) was used with AmberliteTM IR120 Na, AmberliteTM IR96RF, and AmberliteTM IR402, firstly by using anion and mixed bed system, where the following variables are investigated for the process of adsorption: The height of the bed in column (8,10 and 14 cm), different concentrations of (DOC) content at constant flow rate. The use of an ion exchanger unit (continuous system) with three columns (cation, anion, and mixed bed) was studied.
... Show MoreThe artistic process operates whether in general in all arts or specifically in one type of arts or one of the genres of arts types on the preoccupations of the pressing artistic references as the founder of the artistic work in the material formulations on the one hand and on the other hand as a translator to understand the artistic achievement in general and plastic art in particular and for the importance The researcher chose the title of her research tagged (the preoccupations of the pressing reference and its impact on the formations of postmodern arts).
The first chapter of the methodological framework deals with the problem of research, importance, objective, limits, and then terminology and its definition, and then the secon
New series of imidazole[1,2-a]pyridine-sulfonamides was designed and synthesized from 2-aminopyridine, which was reacted with p-bromo phenacyl bromide in the present of MgO to produce the corresponding imidazole[1,2-a]pyridine, which was then reacted with chlorosulfonic acid to produce 2-(4-bromophenyl)imidazole[1,2-a]pyridine-3-sulfonyl chloride [2]. Following that, treatment of (2) with different amines using the grand method to generate imidazole [1,2-a] pyridine sulfonamides. All the synthesized compounds have been characterized by FTIR, 1HNMR and 13CNMR and C.H.N analysis. The DFT, POM analysis and molecular docking were carried out on for all final compounds to investigate drug like attributes, and the results revealed showed that the
... Show MoreDue to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MorePolymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show More