Preferred Language
Articles
/
5BjM65cBVTCNdQwCHqiQ
Fuzzy n-fold
...Show More Authors

In this paper, we introduce the concept of fuzzy n-fold KUideal in KU-algebras, which is a generalization of fuzzy KU-ideal of KUalgebras and we obtain a few properties that is similar to the properties of fuzzy KU-ideal in KU-algebras, see [8]. Furthermore, we construct some algorithms for folding theory applied to KU-ideals in KU-algebras.

Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
On Semigroup Ideals and Right n-Derivation in 3-Prime Near-Rings
...Show More Authors

 The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On Fully (m,n)-stable modules relative to an ideal A of
...Show More Authors

Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
On Light Mapping and Certain Concepts by Using m_X N-Open Sets
...Show More Authors

The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.

View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis and Preliminary Biological Activity Evaluation of New N- Substituted Phthalimide Derivatives
...Show More Authors

A

A new series of bases of Schiff (H2-H4) derived from phthalic anhydrideweresynthesized. These Schiff bases were prepared by the reaction of different amines (tyrosine methyl ester, phenylalanine methyl ester, and isoniazid) with the phthalimide derived aldehyde with the aid of glacial acetic acid or triethylamine ascatalysts. All the synthesized compounds were characterized by (FT-IR and 1HNMR) analyses and were in vitro evaluated for their antimicrobial activity against six various kinds of microorganisms. All the synthesized compounds had been screened for their antimicrobial activity against two Gram-positive bacteria “Staph. Aureus, and Bacillus subtilis

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Sumer Journal For Pure Science
Classify the Nutritional Status of Iraqi children under Five Years Using Fuzzy Classification
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi Parametric Logistic Regression Model with the Outputs Representing Trapezoidal Intuitionistic Fuzzy Number
...Show More Authors

In this paper, the fuzzy logic and the trapezoidal fuzzy intuitionistic number were presented, as well as some properties of the trapezoidal fuzzy intuitionistic number and semi- parametric logistic regression model when using the trapezoidal fuzzy intuitionistic number. The output variable represents the dependent variable sometimes cannot be determined in only two cases (response, non-response)or (success, failure) and more than two responses, especially in medical studies; therefore so, use a semi parametric logistic regression model with the output variable (dependent variable) representing a trapezoidal fuzzy intuitionistic number.

the model was estimated on simulati

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Advances In Science And Technology Research Journal
Experimental Investigation and Fuzzy Based Prediction of Titanium Alloy Performance During Drilling Process
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Apr 04 2023
Journal Name
Journal Of Techniques
Comparison Between the Kernel Functions Used in Estimating the Fuzzy Regression Discontinuous Model
...Show More Authors

Some experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.

View Publication Preview PDF
Crossref (1)
Scopus Crossref