The aim of this paper is introducing the concept of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal. Some properties of (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal have been studied and another characterizations have been given. The relationship of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal that states, a B- -module Ӽ is (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal , if and only if for any two ɱ-element sub-sets and of Ӽɳ, if , for each j = 1, …, ɱ, i = 1,…, ɳ and implies Ạɳ( ) Ạɳ( have been proved..
Alice Walker's novel The Color Purple1983, whose events take place in the rural Georgia and addresses the most important issues in the early 20thcentury; like male dominant society and women submission to men, weaves a mosaic picture of male-female relationships. Black men like Alphonso, Albert and Harpo are portrayed as oppressors, cruel and they exercise power and violence over their wives and daughters. Through the negative portrayal of black male characters, Walker is accused to be a men hating writer because she ''Views oppression as an essentially masculine activity which springs from the male's aggressive need to dominate. In the novel, man is the premium mobile, the one by whom and t
... Show MoreThe current study aims to examine the level of cognitive management requirement among the governmental secondary schools' managers in al-hial province in the kingdom of Saudi Arabia. To do this, the author designed a questionnaire comprised (20) item which was applied on (250) managers included (113) manager hold bachelor degree and (137) manager hold master degree. To carry out this study, the researcher utilized the descriptive approach. The findings revealed that a high level of cognitive management requirements among secondary schools' managers as well as there is a significant difference at the (0.05) level regarding degree type, but there is no a significant difference according to gender variable.
The construction industry presents significant high risks of injury and fatality to its workforce. Adopting prevention through design (PtD) principles is reported to have high potential for mitigating such risks and improving safety outcomes. PtD seeks to assess and reduce workplace hazards during the design phase, minimizing unsafe construction conditions. Despite its potential benefits, the construction industry encounters challenges in effectively utilizing PtD. Thus, the implementation of PtD in the US construction industry is limited, and designers’ awareness remains low. This evident lack of utilization warrants further examination of the contributing factors. The goal of this study is to identify and rank PtD utilization ba
... Show MoreIn this work, the pseudoparabolic problem of the fourth order is investigated to identify the time -dependent potential term under periodic conditions, namely, the integral condition and overdetermination condition. The existence and uniqueness of the solution to the inverse problem are provided. The proposed method involves discretizing the pseudoparabolic equation by using a finite difference scheme, and an iterative optimization algorithm to resolve the inverse problem which views as a nonlinear least-square minimization. The optimization algorithm aims to minimize the difference between the numerical computing solution and the measured data. Tikhonov’s regularization method is also applied to gain stable results. Two
... Show MoreAlot of medical and industrial applications used the metal nanoparticles (NPs) with increase interest to be used as cancer therapy. The current work aimed to prepare AuNPs and AgNPs through the use of plasma jet and test their antitumor mechanism of apoptosis induction. The results indicating the face-centered cubic structures and crystalline nature of AuNPs and AgNPs. Also, the image of FESEM showed that the well dispersions regarding AuNPs and AgNPs, while the NP’s spherical shape with the particle size distributions which are considered to be close that estimated from the XRD. cytotoxicity have been assessed against the Normal embryonic cell line REF and the digestive system (HC , SK-GT-4) cell lines under a variety of the seri
... Show MoreThis paper is devoted to an inverse problem of determining discontinuous space-wise dependent heat source in a linear parabolic equation from the measurements at the final moment. In the existing literature, a considerably accurate solution to the inverse problems with an unknown space-wise dependent heat source is impossible without introducing any type of regularization method but here we have to determine the unknown discontinuous space-wise dependent heat source accurately using the Haar wavelet collocation method (HWCM) without applying the regularization technique. This HWCM is based on finite-difference and Haar wavelets approximation to the inverse problem. In contrast to othe
Modern statistical techniques offer a range of methodologies for modelling time series data, with conditional and unconditional approaches providing complementary insights that enhance overall model accuracy. This article introduced a modified ARIMA model employing conditional and unconditional parameter estimates. The methodology for the new model based on novel methods is provided. The prediction process, one and two steps ahead, is covered in detail, and a novel algorithm is presented. The best model is picked based on various measurement criteria, such as coefficient of determination (R2), root mean squared error (RMSE), and mean absolute scaled error (MASE). The suggested model is applied to a monthly petrol sales dataset (Jan
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More