Preferred Language
Articles
/
bsj-2354
Notes on Traces of a Symmetric Generalized (?, ?)-Biderivations and Commutativity in Prime Rings
...Show More Authors

Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 20 2020
Journal Name
Solid State Technology
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
J-Prime submodules and some related concepts
...Show More Authors

Suppose R has been an identity-preserving commutative ring, and suppose V has been a legitimate submodule of R-module W. A submodule V has been J-Prime Occasionally as well as occasionally based on what’s needed, it has been acceptable: x ∈ V + J(W) according to some of that r ∈ R, x ∈ W and J(W) an interpretation of the Jacobson radical of W, which x ∈ V or r ∈ [V: W] = {s ∈ R; sW ⊆ V}. To that end, we investigate the notion of J-Prime submodules and characterize some of the attributes of has been classification of submodules.

Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dual Notions of Prime Modules
...Show More Authors

       Let R be a commutative ring with unity .M an R-Module. M is called coprime module     (dual notion of prime module) if ann M =ann M/N for every proper submodule N of M   In this paper we study coprime modules we give many basic properties of this concept. Also we give many characterization of it under certain of module.

View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
symmetric analysis of multiple variables classified ranked orthogonal polynomials
...Show More Authors

MCA has gained a reputation for being a very useful statistical method for determining the association between two or more categorical variables and their graphical description. For performance this method, we must calculate the singular vectors through (SVD). Which is an important primary tool that allows user to construct a low-dimensional space to describe the association between the variables categories. As an alternative procedure to use (SVD), we can use the (BMD) method, which involves using orthogonal polynomials to reflect the structure of ordered categorical responses. When the features of BMD are combined with SVD, the (HD) is formed. The aim of study is to use alternative method of (MCA) that is appropriate with order

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Some Properties of Fuzzy Neutrosophic Generalized Semi Continuous Mapping and Alpha Generalized Continuous Mapping
...Show More Authors

 In the current study, the definition of mapping of fuzzy neutrosophic generalized semi-continuous and fuzzy neutrosophic alpha has generalized mapping as continuous. The study confirmed some theorems regarding such a concept. In the following, it has been found relationships among fuzzy neutrosophic alpha generalized mapping as continuous, fuzzy neutrosophic mapping as continuous, fuzzy neutrosophic alpha mapping as continuous, fuzzy neutrosophic generalized semi mapping as continuous, fuzzy neutrosophic pre mapping as continuous and fuzzy neutrosophic γ mapping as continuous.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
A Fixed Point Theorem for L-Contraction in Generalized D-Metric Spaces
...Show More Authors

We define L-contraction mapping in the setting of D-metric spaces analogous to L-contraction mappings [1] in complete metric spaces. Also, give a definition for general D- matric spaces.And then prove the existence of fixed point for more general class of mappings in generalized D-metric spaces.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Bayes estimators of a multivariate generalized hyperbolic partial regression model
...Show More Authors

View Publication
Scopus (1)
Scopus
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Darboux Integrability of a Generalized 3D Chaotic Sprott ET9 System
...Show More Authors

In this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE DIURNAL BIRDS OF PREY (RAPTORS) IN THE MESOPOTAMIAN MARSHES OF SOUTHERN IRAQ WITH NOTES ON THEIR CONSERVATION STATUS
...Show More Authors

Birds of prey (Raptors) are top predator avian species that many migrate annually through Mesopotamian marshes in southern Iraq toward their wintering grounds in Arabia and Africa, while others are breeding residents; however, information on their current status is scarce. From January 2016 to April 2019, a total of 20 field expeditions were conducted in the geographical zone of the Mesopotamian marshes, wetlands of international importance. The survey covered the Central Marshes, Al-Hammar and Hawizeh Marsh. One of the objectives of the field surveys is to list the raptors species that wintering and/or migrating through the Mesopotamian marshes and to understand their current spatial and temporal distribution. In the present study, a to

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Crossref