The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_j,v_j ) ∀ u_1,v_1 〖ϵA〗_1 ,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u;
If d+d is an n -additive mapping from A_1×A_2×…×A_n to M;
d(u_1,u_2,…,(u_j,v_j ),…,u_n)∈ Z(M) ∀〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u,;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))∈ Z(M) ∀ u_1,v_1 〖ϵA〗_1 ,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u;
Then M is a commutative ring.
The physical, the thermal and the mechanical properties of Nano-composites, that consisted of Polyprime EP epoxy that reinforced by multi-walled carbon nanotubes (MWCNTs), have been studied. Various loading ratios, 0.1, 0.5, and 1 wt. %of MWCNT shave been infused into epoxy by a magnetic stirrer and then the hardener mixed with the mthat supplied with the epoxy. All sample shave been cutting using CNC machine. Tensile test, three-point bending, hardness tests, lee's disk, differential scanning calorimetry, water absorption and dielectric and electrical conductivity test were utilized on unfilled, MWCNT-filled epoxy to identify the loading effect on the properties of materials. Scanning electron microscopy (SEM) was used to determine the
... Show MoreThe presented work shows a preliminary analytic method for estimation of load and pressure distributions on low speed wings with flow separation and wake rollup phenomena’s. A higher order vortex panel method is coupled with the numerical lifting line theory by means of iterative procedure including models of separation and wake rollup. The computer programs are written in FORTRAN which are stable and efficient.
The capability of the present method is investigated through a number of test cases with different types of wing sections (NACA 0012 and GA(W)-1) for different aspect ratios and angles of attack, the results include the lift and drag curves, lift and pressure distributions along the wing s
... Show MoreThis research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students
... Show MoreAbstract
This paper concerned with study the effect of a graphite micro powder mixed in the kerosene dielectric fluid during powder mixing electric discharge machining (PMEDM) of high carbon high chromium AISI D2 steel. The type of electrode (copper and graphite), the pulse current and the pulse-on time and mixing powder in kerosene dielectric fluid are taken as the process main input parameters. The material removal rate MRR, the tool wear ratio TWR and the work piece surface roughness (SR) are taken as output parameters to measure the process performance. The experiments are planned using response surface methodology (RSM) design procedure. Empirical models are developed for MRR, TWR and SR, using the analysis
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show Moreاثناء تفاعل الديزنة تكونت صبغة أزو جديدة عن طريق تفاعل 3-امينوفينول مع 2,4,6-ثلاثي هيدروكسي اسيتوفينون . ثم تم تفاعل هذا الليكاند مع بعض ايونات العناصر الكروم والحديد الروديوم والروثينيوم بتكفؤهم الثلاثي والكوبلت الثنائي والموليبدينوم سداسي التكافؤ مكونة معقدات فلزية مختلفة بأشكال هندسية متعددة. تم ملاحظة تناسق مجموعة الازو مع ايونات العناصر من خلال ملاحظة ظهور حزم امتصاص الفلز مع النتروجين والاوكسجين ب
... Show MoreIn this paper, series of new complexes of Manganese(II), Cobalt(II), Nickel (II) Cupper(II) Zinc(II), Cadmium(II) and Mercury (II) are prepared from the new ligand [2-(3-benzoylthioureido)-3-(-4- hydroxyphenyl) propanoic acid (BHP) derived from tyrosine and benzoylisothiocyanate .Chemical structures are obtained from their 1 H, 13CNMR spectra (for BHP), elemental microanalyses, molar conductance, FTIR, UV–Vis, magnetic susceptibility in addition to TGA/DTG and DSC analysis, the suggested geometry for all complexes was tetrahedral. The biological activity of BHP and its complexes has been extensively studied against two bacterial species Staphylococcus aurous (G+) and Escherichia coli (G-) by agar-well diffusion technique, where Mn(II), Co
... Show MoreConsider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs derived from the group and a few classes of zero-divisor graphs of the commutative ring R are examined.
Objective(s): The main aim of the study is to determine the level of burden on mothers toward children with anorectal malformation.
Methodology: A descriptive study was carried out at Welfare Pediatric Teaching Hospital and Central Pediatric Teaching Hospital in Baghdad City. From November 15th, 2017 to April 29th, 2018. Convenient sample comprised of (140) children mothers with anorectal malformation were interviewed for the study. The instrument of study is composed of six domains related mothers' burden toward psychosocial burden as a result of child with anorectal malformation. Validity of the study instrument was determined through a panel of experts and the reliability of the questionnaire is determined in a pilot study among (1
Aims: This study was done to investigate the effect of low energy laser therapy on bone healing at the extraction site. Materials and methods:(24) male albino rats were exposed to the extraction procedure of the maxillary first molar on the first day of a seven day experiment and these animals were divided into two main groups; the control group and the laser group. The laser experiment involved using (Ga-As infrared diode laser) from optodent by directing the probe over the extraction site. The control group consisted of 4 rats, and the laser group was subdivided into 5 subgroups of 4 rats each. The laser dose was as follows: B1: a single dose of 5 minutes immediately after extraction.,
... Show More