The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.
Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreFind cares studying ways in the development of industrial products and designs: the way the progressive development (how typical) and root development (jump design), was the aim of the research: to determine the effectiveness of the pattern and the jump in the development of designs and industrial products. After a process of analysis of a sample of research and two models of contemporary household electrical appliances, it was reached a set of findings and conclusions including:1-leaping designs changed a lot of entrenched perceptions of the user on how the product works and its use and the size and shape of the product, revealing him about the possibilities of sophisticated relationships with the product, while keeping the typical desi
... Show MoreThe importance of government Expenditure policy in economy come from its role leading to the mitigation and adjustment of fluctuations in macroeconomic variables caused by imbalance between aggregate demand and aggregate supply, It is associated with the efficient management of government Expenditure to reinforcement the relationship between government Expenditure and the overall economic system .
Regarding the Iraqi economy,the increasing in financial rentier after the political change in 2003 has led to finance the budgets Characterized by consumption,The government Expenditure employed to encourage government employment in services jobs, and find different channels for the distribution of
... Show MoreProteus mirabilis is considered as a third common cause of catheter-associated urinary tract infection, with urease production, the potency of catheter blockage due to the formation of biofilm formation is significantly enhanced. Biofilms are major virulence factors expressed by pathogenic bacteria to resist antibiotics; in this concern the need for providing new alternatives for antibiotics is getting urgent need, This study aimed to explore whether green synthesized zinc oxide nanoparticles (ZnO NPs) can function as an anti-biofilm agent produced by P.mirabilis. Bacterial cells were capable of catalyzing the biosynthesis process by producing reductive enzymes. The nanoparticles were synthesized from cell free
... Show MoreThe main objective of this thesis is to study new concepts (up to our knowledge) which are P-rational submodules, P-polyform and fully polyform modules. We studied a special type of rational submodule, called the P-rational submodule. A submodule N of an R-module M is called P-rational (Simply, N≤_prM), if N is pure and Hom_R (M/N,E(M))=0 where E(M) is the injective hull of M. Many properties of the P-rational submodules were investigated, and various characteristics were given and discussed that are analogous to the results which are known in the concept of the rational submodule. We used a P-rational submodule to define a P-polyform module which is contained properly in the polyform module. An R-module M is called P-polyform if every es
... Show MoreThe goal of this discussion is to study the twigged of pure-small (pr-small) sub- moduleof a module W as recirculation of a small sub-module, and we give some basic idiosyncrasy and instances of this kind of sub-module. Also, we give the acquaint of pure radical of a module W (pr-radical) with peculiarities.
The main goal of this paper is to dualize the two concepts St-closed submodule and semi-extending module which were given by Ahmed and Abbas in 2015. These dualizations are called CSt-closed submodule and cosemi-extending mod- ule. Many important properties of these dualizations are investigated, as well as some others useful results which mentioned by those authors are dualized. Furthermore, the relationships of cosemi-extending and other related modules are considered.
الخلاصة:
ان المحادثة كانت الشغل الشاغل لكثیر من العلماء المھتمین بدراستھم بھذا المجال من امثال ساكس
.( واخرون ( ١٩٧٤ ) وغرایس ( ١٩٧٥ ) و شكلوف و اخرون ( ١٩٧٧ ) و دانكن ( ١٩٧٢ ) و بیرتن ( ١٩٨٠
قدمت بیرتن ( ١٩٨٠ ) تحلیلا لمسرحیة النادل الابكم لغرض تقدیم طریقتھا. تتوخى الباحثة من
تقدیم ھذا البحث تحلیل تركیب المحادثة منتدى حول القصة الادبیة و القصة الروائیة باستعمال نموذج بیرتن
١٩٨٠ ). و یمیل البحث الى الاجابة عن ا
Abstract
One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.
In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More