Preferred Language
Articles
/
bsj-3195
The Jacobson Radical of the Endomorphism Semiring of P.Q.- Principal Injective Semimodules

 

 In this work, we introduced the Jacobson radical (shortly Rad (Ș)) of the endomorphism semiring Ș =  ( ), provided that  is principal P.Q.- injective semimodule and some related concepts, we studied some properties and added conditions that we needed. The most prominent result is obtained in section three

-If   is a principal self-generator semimodule, then (ȘȘ) = W(Ș).

Subject Classification: 16y60

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Some Properties of Fuzzy Neutrosophic Generalized Semi Continuous Mapping and Alpha Generalized Continuous Mapping

 In the current study, the definition of mapping of fuzzy neutrosophic generalized semi-continuous and fuzzy neutrosophic alpha has generalized mapping as continuous. The study confirmed some theorems regarding such a concept. In the following, it has been found relationships among fuzzy neutrosophic alpha generalized mapping as continuous, fuzzy neutrosophic mapping as continuous, fuzzy neutrosophic alpha mapping as continuous, fuzzy neutrosophic generalized semi mapping as continuous, fuzzy neutrosophic pre mapping as continuous and fuzzy neutrosophic γ mapping as continuous.

Scopus (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Dedekind Multiplication Semimodules

The aim of this paper is to introduce the concept of Dedekind semimodules and study the related concepts, such as the class of  semimodules, and Dedekind multiplication semimodules .  And thus study the concept of the embedding of a semimodule in another semimodule. 

Scopus (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weakly Relative Quasi-Injective Modules

    Let R be a commutative ring with unity and let M, N be unitary R-modules. In this research, we give generalizations for the concepts: weakly relative injectivity, relative tightness and weakly injectivity of modules. We call M weakly N-quasi-injective, if for each f  Hom(N,) there exists a submodule X of  such that  f (N)  X ≈ M, where  is the quasi-injective hull of M. And we call M N-quasi-tight, if every quotient N / K of N which embeds in  embeds in M. While we call M weakly quasi-injective if M is weakly N-quasiinjective for every finitely generated R-module N.         Moreover, we generalize some properties of weakly N-injectiv

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Radical democracy of Axel Honneth

In contemporary discourses the debate of most Western thinkers is about the efforts to clarify the normative foundations of democracy. And then, some political thinkers have adopted other models differ in terms of standards for traditional liberal democracy. Be the common goal of democracy will give the formation of a greater role than usual in political liberalism rather than limiting the participatory activity of citizens on the function to give permanent legitimacy to the exercise of state authority. The activity is to be permanently enshrined in the democratic public sphere and the issue must be understood as the source of all political decisions.

 

Crossref
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Quasi-Radical Semiprime Submodules

      In this paper, we introduce the concept of a quasi-radical semi prime submodule. Throughout this work, we assume that    is a commutative ring with identity and  is a left unitary R- module. A  proper submodule  of  is called a quasi-radical semi prime submodule (for short Q-rad-semiprime), if     for   ,   ,and then  . Where   is the intersection of all prime submodules of .

Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Generalized Radical Lifting Modules

In this paper we introduce G-Rad-lifting module as aproper generalization of lifting module, some properties of this type of modules are investigated. We prove that if M is G-Rad- lifting and
, then
, and
are G-Rad- lifting, hence we Conclude the direct summand of G-Rad- lifting is also G-Rad- lifting. Also we prove that if M is a duo module with
and
are G- Rad- lifting then M is G-Rad- lifting.

View Publication Preview PDF
Publication Date
Mon Apr 01 2013
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Clinical assessment of external fixation in pelvic ring fractures

Background: Unstable pelvic ring fractures (PRF) are high energy trauma, commonly associated with systemic and soft tissues elements injures, the external fixation as an emergency and final treatment is one of the options in its management.

Objective: to evaluate the value and role of external fixation for unstable (PRF) and its clinical outcomes.

Patients and methods: twenty one patients with unstable P.R.F have been treated by external fixation , they were 16 men and 5 women ,their  average age was 28 years (range ;18-60 years) , two thirds of the cases were due to road traffic accident , 85% were hemodynamicaly unstable , urological and neurological, anorectal injuries were the commonest associate

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of Robust Principal Components Depends on the some methods of Projection-Pursuit

The analysis of the classic principal components are sensitive to the outliers where they are calculated from the characteristic values and characteristic vectors of correlation matrix or variance Non-Robust, which yields an incorrect results in the case of these data contains the outliers values. In order to treat this problem, we resort to use the robust methods where there are many robust methods Will be touched to some of them.

   The robust measurement estimators include the measurement of direct robust estimators for characteristic values by using characteristic vectors without relying on robust estimators for the   variance and covariance matrices. Also the analysis of the princ

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Processing of missing values in survey data using Principal Component Analysis and probabilistic Principal Component Analysis methods

The idea of ​​carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component  Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed

... Show More
Crossref
View Publication Preview PDF