Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings and modules. .
Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreThe purpose of this research highlight the achievement of the effectiveness of small and medium enterprises dimensions and conformable to analyze the relationship between business strategies and human resources management strategies , and launched search of a dilemma thought provoking fundamental questions revolve around the search is the lack of appropriate strategies in these enterprises to help them continuity and permanence in business and markets , as these enterprises lack the human resources management strategies appropriate , as well as business strategies that make them withstand the changes in the market environment is changing and volatile . It was to
... Show MoreThe importance of the present work falls on the pitting corrosion behavior investigation of 304 SS and 316 SS alloys in 3.5 wt% of aqueous solution bearing with chloride and bromide anion at different solutions temperature range starting from (20-50)oC due to the pitting corrosion tremendous effect on the economic, safety and materials loss due to leakage. The impact of solution temperatures on the pitting corrosion resistance at 3.5wt% (NaCl and NaBr) solutions for the 304 SS and 316 SS has been investigated utilizing the cyclic polarization techniques at the potential range -400 to1000 mV vs. SCE at 40 mV/sec scan rate followed by the surface characterization employing Scanning Electron&nbs
... Show MoreThe research aims to test the impact of servant leadership in management information systems, as well as to identify the level of servant leadership practice and management information systems in the Directorate of Communications and Information Systems in the Iraqi Ministry of Interior, in terms of the importance of the research variables to the directorate and the sample community, as the research adopted the exploratory analytical descriptive approach In his achievement, through a survey of the opinions of an intended quota sample of (266) individuals, By adopting the questionnaire as a main tool for data collection that includes (44) items divided into the two research variables, As well as conducting open interviews to identify the pro
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreThere is a scarcity of data regarding algal flora of Tigris River in the territory of Baghdad. The present study deals with Tigris River in Al-Dora site in Baghdad province from November 2014 to June 2015 in order to shed light on its epiphytic Algae on (Phragmites australis) and epipelic algae. An amount of 183 and 154 species of epiphytic and epipelic algae are identified respectfully. The Bacillariophyceae (diatoms) are the dominant algal group followed by Cyanophyceae and Chlorophyceae. Moreover, 90 species are shared between two groups of algae (epiphytic and epipelic) and identified at the study site. Additionally, the seasonal variations and diversity of algal species are noticed. The highest number of epiphytic algae is 772.05 x 104
... Show MoreFour antimony compounds were used in this inves as additives to retard combustion of unsaturated polyester and epoxy resins, namely: 1. Tetraethyl ammonium tribromoethylantimonates (additive I). 2. Tetraethyl ammonium chlorodibromoethylantimonates (additive II). 3. Tetraethyl ammonium trichloroethylantimonates (additive III). 4. Tetraethyl ammonium bromodichloroethylantimonates (additive IV). The effects of these additives on flammability of unsaturated polyester and epoxy resins have been studied by using sheets of the resins with weight percentages of (0.5,1.0,1.5,2.0,2.5&3.0%) of the additives in dimensions of (150 X150X3)mm .Three standard test methods were used to measure the flame retardation which are: (ASTM:D -2863), (ASTM:D-635
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreAttention increased to the topic of academic accreditation by the university as a modern philosophy by which to improve its performance and provide high-quality education. Universities and colleges in general and Iraqi universities and colleges in particular have begun interest in accreditation and desire to get it. So starting from the pursuit of the Administration and Economics College / Baghdad University in obtaining accreditation of Association to Advance Collegiate Schools of Business (AACSB) The research is present which aims to determine the level of application (AACSB) International standards at the College of Administration and Economics / Baghdad University in preparation to get its accreditation in the future. Researc
... Show More