Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings and modules.
We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.
Let Ḿ be a unitary R-module and R is a commutative ring with identity. Our aim in this paper to study the concepts T-ABSO fuzzy ideals, T-ABSO fuzzy submodules and T-ABSO quasi primary fuzzy submodules, also we discuss these concepts in the class of multiplication fuzzy modules and relationships between these concepts. Many new basic properties and characterizations on these concepts are given.
Abstract
The traffic jams taking place in the cities of the Republic of Iraq in general and the province of Diwaniyah especially, causes return to the large numbers of the modern vehicles that have been imported in the last ten years and the lack of omission for old vehicles in the province, resulting in the accumulation of a large number of vehicles that exceed the capacity of the city's streets, all these reasons combined led to traffic congestion clear at the time of the beginning of work in the morning, So researchers chose local area network of the main roads of the province of Diwaniyah, which is considered the most important in terms of traffic congestion, it was identified fuzzy numbers for
... Show MoreObjective: To evaluate male patients complaining of
urethritis clinically according to the isolated organisms.
Method: A total of 100 male patients attending to of
Dermatological and Venereal private clinics for the period
April 2003 to November 2003 were included in the study.
Urethral swab was obtained from each male for culture and
direct immunofluorescence examination was done.
Demographic data was obtained, also.
Results: N. gonorrhoea was the predominate cause of
infection in 22%. A peak of infection was reported in the
second decade of age. Highest rate reported among single
males. A significant association was noticed between
profuse discharge and infection with gonorrhoea.
Conclusion: This
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
The Immanence in S. Abdu; Saboor Poetry
After this stage in the Bible is problematic and the profane in the poetry of the AL-Sayeghs,
and found that the poems path heading towards obey religious authority because of their wills
and powers, and the insurgency in other areas, as it did not employ shady methods and puns
and intriguing, and I find the reason for this is due to the fear poet focused toward the
influence of political Sergeant, more than effusion direction ascendancy religious sergeant,
was a AL-Sayeghs stop at this border; but went to the formulations problematic diversity in
the cognitive system, he tries it all to critique, as submitted by the history of the conflicts
produced generations of oppression and conflict and tension (what my fault I
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More