Let h is Γ−(λ,δ) – derivation on prime Γ−near-ring G and K be a nonzero semi-group ideal of G and δ(K) = K, then the purpose of this paper is to prove the following :- (a) If λ is onto on G, λ(K) = K, λ(0) = 0 and h acts like Γ−hom. or acts like anti–Γ−hom. on K, then h(K) = {0}.(b) If h + h is an additive on K, then (G, +) is abelian.
Background: Pulpotomy is an accepted treatment for the management of cariously exposed pulps in symptom free primary molars to achieve one of the most important goals for Pedodontists, which is the retention of the pulpally involved deciduous teeth healthy until the time of normal exfoliation. The purpose of this study was to evaluate the relative success of pulpotec, formocresol and Mineral Trioxide Aggregate (MTA) in cariously exposed primary molar teeth, using clinical and radiographical examinations. Materials and methods: Thirty nine children with 45 primary molars requiring pulpotomy were selected in this study, 15 teeth treated by each type of pulpotomy medicament. Clinical and radiographical follow up for the patients was performed
... Show MoreThe current work was designed to investigate serum angiopoietin like protein-8 and hyaluronic acid among Iraqi hemodialysis patients with and without type 2 diabetes mellitus, and to find relationship between them, as well as if these patients are at risk of kidney fibrosis. Subjects & Methods: in this study, serum samples were obtained from (60) Iraqis patients with end stage renal diseases (ESRD)on hemodialysis (HD) (30 patients with T2DM (G2) and 30 patients withoutT2DM (G3)) in addition to (30) healthy individuals as a control group (G1), their ages ranged from (35-65) years. The patients attended the Al-Yarmouk Teaching Hospital, Baghdad. Results: the results in this study showed a highly a significant elevation inserum angiopoietin li
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreAbstract
The current research aims to identify the level of partnership between school and community agencies to improve secondary school outcomes for students with intellectual disabilities and develop strategies that help enhance community partnerships between schools and agencies. The researcher used the qualitative research approach; he utilized the interviews as a tool for data collection. The sample of research included (12) participants: three female school leaders, three male-school leaders, three female-school supervisors, and three male-school supervisors in schools that have programs for students with intellectual disabilities in Riyadh. The results of the study showed that the level of partnership bet
... Show MoreThis paper presents a new azo dye 3-[2-(1H-indol-2-yl)ethyldiazenyl]quinolin-2-ol] from the reaction of the diazonium salt derived from tryptamine and 2-hydroxyquinoline. Azo dye was used to prepare a series of complexes with the chlorides of Ni(II), Pt(IV), Pd(II), Cd(II), and Zn(II). Compounds were analyzed and characterized using elemental analysis, magnetic measurement, UV-vis, IR, MS, NMR, and conductivity. The findings demonstrated that the ligand acts as ionic in complex form, O-bidentate, supporting the proposed formula. The complexes generally exhibited tetrahedral and octahedral geometries, except the palladium complex, which adopted a square planar geometry. TGA was used to investigate the thermal characteristics of compo
... Show MoreNew series of metal ions complexes have been prepared from the new ligand [4-Amino-N-(5- methyl-isaxazol-3-yl)-benzenesulfonamide] derived from Sulfamethoxazole and 3-aminophenol. Accordingly, mono-nuclear Mn(II), Fe(III), Co (II), and Rh(III) complexes were prepared by the reaction of previous ligand with MnCl2.4H2O, CoCl2.6H2O, FeCl3.6H2O and RhCl3H2O, respectively. The compounds have been characterized by Fourier-transform infrared (FTIR), ultraviolet–visible (UV–vis), mass, 1H-, and 13C-nuclear magnetic resonance (NMR) spectra and thermo gravimetric analysis (TGA& DSC) curve, Bohr magnetic (B.M.), elemental microanalyses, metal ions, chloride containing, and molar conductance.These reviews uncovered octahedral geometries for complex
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show More