Preferred Language
Articles
/
_xcgzY0BVTCNdQwCkRsp
Fully extending modules
...Show More Authors

Throughout this paper we introduce the concept of quasi closed submodules which is weaker than the concept of closed submodules. By using this concept we define the class of fully extending modules, where an R-module M is called fully extending if every quasi closed submodule of M is a direct summand.This class of modules is stronger than the class of extending modules. Many results about this concept are given, also many relationships with other related concepts are introduced.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
On J–Lifting Modules
...Show More Authors
Abstract<p>Let R be a ring with identity and M is a unitary left R–module. M is called J–lifting module if for every submodule N of M, there exists a submodule K of N such that <inline-formula> <tex-math><?CDATA ${\rm{M}} = {\rm{K}} \oplus \mathop {\rm{K}}\limits^\prime,\>\mathop {\rm{K}}\limits^\prime \subseteq {\rm{M}}$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block" overflow="scroll"> <mrow> <mi mathvariant="normal">M</mi> <mo>=</mo> <mi mathvariant="normal">K</mi></mrow></math></inline-formula></p> ... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Study of optical bistability in a fully optimized laser Fabry-Perot system
...Show More Authors

The analytical study of optical bistability is concerned in a fully
optimized laser Fabry-Perot system. The related phenomena of
switching dynamics and optimization procedure are also included.
From the steady state of optical bistability equation can plot the
incident intensity versus the round trip phase shift (φ) for different
values of dark mistuning 




12
,
6
,
3
,
1.5
0 , o
   
 or finesse (F= 1, 5, 20,
100). In order to obtain different optical bistable loops. The inputoutput
characteristic for a nonlinear Fabry-Perot etalon of a different
values of finesse (F) and using different initial detuning (φ0) are used
in this rese

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Ieee Internet Of Things Journal
A New Task Allocation Protocol for Extending Stability and Operational Periods in Internet of Things
...Show More Authors

Scopus (17)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
On large-hollow lifting modules
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dual Notions of Prime Modules
...Show More Authors

       Let R be a commutative ring with unity .M an R-Module. M is called coprime module     (dual notion of prime module) if ann M =ann M/N for every proper submodule N of M   In this paper we study coprime modules we give many basic properties of this concept. Also we give many characterization of it under certain of module.

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
On Quasi-Small Prime Modules
...Show More Authors
Abstract<p>Let R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.</p>
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
H - He-essential-supplemented modules
...Show More Authors

Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weakly Relative Quasi-Injective Modules
...Show More Authors

    Let R be a commutative ring with unity and let M, N be unitary R-modules. In this research, we give generalizations for the concepts: weakly relative injectivity, relative tightness and weakly injectivity of modules. We call M weakly N-quasi-injective, if for each f  Hom(N,) there exists a submodule X of  such that  f (N)  X ≈ M, where  is the quasi-injective hull of M. And we call M N-quasi-tight, if every quotient N / K of N which embeds in  embeds in M. While we call M weakly quasi-injective if M is weakly N-quasiinjective for every finitely generated R-module N.         Moreover, we generalize some properties of weakly N-injectiv

... Show More
View Publication Preview PDF