25 research outputs found
T-Essentially Coretractable and Weakly T-Essentially Coretractable Modules
نقدم في هذا البحث اعمامات جديدة للمقاسات المنكمشة المضادة حيث اطلقنا على المقاس اسم منكمش مضاد جوهري من النوع-T أو منكمش مضاد جوهري ضعيف من النوعT- إذا كان لكل مقاس جزئي K من المقاس ، يوجد f∈End( ) و f (K)=0 بحيث ان Imf≤tes او Imf + K≤tes . تم دراسة بعض الخصائص الأساسية و عرض العديد من العلاقات بين هذه المقاسات ومقاسات اخرى ذات الصلة. A new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented
Synthesis, Characterization and Thermal Study of Polyimides Derived from Polystyrene
A novel polyimides of polystyrene with high thermal stability were prepared by the reaction of aminated polystyrene with Benzophenone tetracarboxylic dianhydride. The aminated polystyrene were prepared from the nitration of polystyrene followed by chemical reduction of its nitro groups. Infrared (FT-IR) spectra and thermogravimetric analysis (TGA) were used to characterize polymers . The prepared polymer exhibit good thermal and thermooxidative stability at polymer decomposition temperature greater than 550°C in air atmosphere . Another attractive feature is their high char yields 75% at 650°C in air atmosphere
Electroencephalography (EEG) Based Mobile Robot Control through an Adaptive Brain Robot Interface
This project mentioned a couple of brain controlled automaton supported Brain–computer interfaces (BCI). BCIs square measure systems that may by pass standard channels of communication (i.e., muscles and thoughts) to produce direct communication and management between the human brain and physical devices by translating totally different patterns of brain activity into commands in real time. With these commands a mobile automaton may be controlled. The intention of the project work is to develop a automaton that may assist the disabled folks in their standard of living to try and do some work freelance on others. Brain signals are detected by the brain wave device and it'll convert the info into packets and transmit through Bluetooth medium. Level instrument unit (LAU) can receive the brain wave information and it'll extract and method the signal victimization Mat lab platform. Then the management commands are transmitted to the robotic ARM module to method. With this whole system, we will choose AN object and place it consequently through the designed brain signals
A Numerical And Experimental Study of Louvered Fin Heat Exchanger Performance
The louvered fin heat exchanger is a very widely used method to increase thecompact heat transfer coefficient on the air-side of condensers by adding fins andinitiating new boundary layer growth and increasing surface area. The governingequations of such application are the Navier Steckes equation and energy equation. Atwo-dimensional, turbulent, compressible flow is simulated and solved. The solutiongives the distributions of velocity and temperature (which is represented by Nusseltnumber). Laminar and turbulent flow were studied experimentally and only turbulentflow was studied theoretically, for a range of ReLp 230 to 8100 with constant inlettemperature of 21C˚with two angles of louver fin 27˚ and 35 ˚. The ideal geometry forheat transfer performance was determined to be dependent on Reynolds number. Atlower Reynolds number the optimal geometry was found to be θ = 27º and at highReynolds number the ideal geometry was determined to beθ = 35º, Fp/Lp = 0.58
Clinical importance of imaging anatomical signs in predicting transverse sinus dominance using conventional magnetic resonance imaging
Background: Differentiating flow gaps associated with hypoplastic transverse sinus from venous thrombosis is a diagnostic challenge in brain magnetic resonance imaging with venography.
Objectives: To assess the clinical benefit of anatomical signs to anticipate the side of the dominant transverse sinus.
Patients and Methods: A total of 100 patients underwent brain magnetic resonance imaging with venography at the radiology department /medical city and were retrospectively reviewed for the direction of superior sagittal sinus flow void, inclination of sulcus for the superior sagittal sinus, angulation of the posterior falx and direction of occipital lobe bending in axial non-contrast T1 weighted image, then compare these findings with a side of the dominant transverse sinus in magnetic resonance venography.
Results: Inclination of sulcus for superior sagittal sinus and superior sagittal sinus flow void direction toward the right side had high positive predictive values (95.5%) and (93.2 %) in proper matching with the right transverse sinus dominance, respectively. Right-sided angulation of the posterior flax and rightward direction of the occipital lobe had a positive predictive value of (90.9 %) in predicting transverse sinus dominance.
Conclusion: The side of dominant transverse sinus can be anticipated by reviewing anatomical signs in T1 weighted image, which may help to differentiate hypoplastic transverse sinus from venous thrombosis that aid in better interpretation of brain MRI- MRV examinations.
Moisture sensitivity of crumb rubber modified modifier warm mix asphalt additive for two different compaction temperatures
Crumb rubber obtained from scrap tires has been incorporated with asphalt binder to improve the performance of asphalt mixtures in the past decades. Pavements containing crumbrubber modified (CRM) binders present one major drawback: larger amounts of greenhouse gas emissions are produced as there is rise in the energy consumption at the asphalt plant due to the higher viscosity of these type of binders compared with a conventional mixture. The objective of this paper is to calculate the optimum bitumen content for each percentage and evaluate the moisture sensitivity of crumb rubber modified asphalt at two different compacting temperatures. In this study, crumb rubber modified percentages was 0%, 5%, 10% and 15% from the binder weight, with adding 1.5% warm mix asphalt additive (Sasobit) and crush granite aggregate of 9.5mm Nominal maximum size was used after assessing its properties. Ordinary Portland Cement (OPC) used by 2% from fine aggregate. The wet method was using to mix the CRM with bitumen, the CRM conducted at 177°C for 30 min with 700rpm and Sasobit conducted at 120°C for 10 min with 1000rpm. As a result, from this study the optimum bitumen content (OBC) was increased with increased crumb rubber content. For performance test, it was conducted using the AASHTO T283 (2007): Resistance of Compacted Bituminous Mixture to Moisture-Induced Damage. The result was as expected and it was within the specification of the test, the result show that the moisture damage increased with increased the crumb rubber content but it is not exceeding the limit of specification 80% for indirect tension strength ratio (ITSR). For the temperature was with lowing the temperature the moisture damage increased
Computed tomography assessment of the ethmoid roof based on Keros classification in Iraqi patients undergoing functional endoscopic sinus surgery
Background: Among the most popular methods employed to classify the depth of the olfactory fossa is Keros classification. This study aims to assess Keros classification of the ethmoid roof, any possible association between Keros types and gender, and the incidence of asymmetry between right and left sides among Iraqi patients.
Methods: A retrospective cross-sectional study was conducted at Al-Shaheed Gazi Al-Hariri Teaching Hospital, Medical City, Baghdad, Iraq. The archived reports and the CT scans images (nose and paranasal sinuses) of 126 patients who have undergone functional endoscopic sinus surgery between January 2019 and January 2020 were reviewed. Univariate and bivariate statistical analysis was performed using SPSS version 24. The statistically significant was considered at less than 0.05.
Results: More than half of patients were females (54.0%) with a mean age of 31.52 ± 11.38 (SD) years (range: 10-57 years). Among the total patients, the mean depth of olfactory fossa (OF) was 3.58 ± 0.02 mm. Results showed that Keros type I was the most common type (71.0%), followed by type II (27.4%) and type III (1.6%) respectively. The difference in the olfactory fossa depth between the right and left sides was ≥ 1 mm in 16 (12.7%) patients and < 1 mm in 110 (87.3%) patients. Moreover, there was no significant relation between symmetry/asymmetry and gender ( p-value > 0.05).
Conclusion: Keros type I was the most common type, which carries the lowest risk of inadvertent intracranial injury during endoscopic sinus surgery; besides the relatively low percentage of asymmetry in the depth of the two olfactory fossae among patients, surgeons should always be cautious during surgery to avoid iatrogenic injury concerning the thin lateral lamella of the cribriform plate
Job desertification as a modified variable in the relationship between the cognitive biases of the leader and the organizational anomie
The study aims to improve employees’ understanding regards the modifying impact of job desertification on the relationship between cognitive biases and organizational anomie. Furthermore, the study also aims to examine a the direct relationship between each of the cognitive biases and the organizational anomie among the 305 employees working at Al-Hussein Teaching Hospital, Karbala region, Iraq. Outcomes confirmed the hypothesis that organizational anomie is favourably impacted by every of the cognitive biases pursued by the leader and dealt with, as a daily behavior, at work. The results also proved that the dimensions of cognitive biases have a positive impact on the organizational anomie. In addition to this, the nature of the connection between cognitive biases and organizational anomalies is affected by job desertification. Thus, the current study outcomes contribute towards the importance of understanding the job desertification behaviours exhibited by the employees in an organization. In general, Job desertification heavily deteriorates organizational performance, increases the mistrust between the leader and their subordinates and increases the moral deterioration of the employees in an organization
Smart House Management Features in Some Recent Published Papers
This paper presents the results of the bibliographic exploration that has been made in this research direction. Although relatively new, the scientific subject of the smart house (or intelligent home) benefits from several scientific reports pub-lished so far. It falls within the general field of Internet of things (IoT). The bibliographic study allows to highlight the more significant reported results but also to define future and immediate research directions
Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography
Electronic-commerce (e-commerce) has become a provider of distinctive services to individuals and companies due to the speed and flexibility of transferring orders and completing commercial deals across far and different places. However, due to the increasing attacks on penetrating transaction information or tampering with e-commerce requests, the interest in protecting this information and hiding it from tamperers has become extremely important. In addition, hacking these deals can cause a huge waste of money and resources. Moreover, large numbers of connected and disconnected networks can cause significant disruption to the built-in security measures. In this paper, we propose to design a protocol to protect transaction information based on ElGamal, advanced encryption standard (AES) and Chinese remainder theorem (CRT) techniques. In addition, our protocol ensures providing scalability with high-performance security measures. We combine these algorithms with a robust methodology that supports the balance of performance and security of the proposed protocol. An analysis of our results proves that our protocol is superior to existing security protocols