Preferred Language
Articles
/
bsj-542
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings and modules. .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 17 2019
Journal Name
International Journal Of Research In Social Sciences And Humanities
A CRITICAL DISCOURSE ANALYSIS OF RHETORICAL DEVICES OF TRUMP'S AND MAY'S SPEECHES DURING THE PERIOD 2017 TO 2019
...Show More Authors

DBNRHM Sami, International Journal of Research in Social Sciences and Humanities, 2020

View Publication
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
...Show More Authors

في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 07 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS: DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS
...Show More Authors

The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 03 2015
Journal Name
International Journal Of Advanced Scientific And Technical Research
Semi-Extending
...Show More Authors

Throughout this paper R represents commutative ring with identity, and M is a unitary left R-module. The purpose of this paper is to study a new concept, (up to our knowledge), named a semi-extending modules, as generalization of extending modules, where an Rmodule M is called semi-extending if every sub module of M is a semi-essential in a direct summand of M. Various properties of semi-extending module are considered. Moreover, we investigate the relationships between semi-extending modules and other related concepts, such as CLS-modules and FI- extending modules.

Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Shrinkage Estimation for R(s, k) in Case of Exponentiated Pareto Distribution
...Show More Authors

   This paper concerns with deriving and estimating the reliability of the multicomponent system in stress-strength model R(s,k), when the stress and strength are identical independent distribution (iid), follows two parameters Exponentiated Pareto Distribution(EPD) with the unknown shape and known scale parameters. Shrinkage estimation method including Maximum likelihood estimator (MLE), has been considered. Comparisons among the proposed estimators were made depending on simulation based on mean squared error (MSE) criteria.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Al-nahrain University-science
St-closed Submodule
...Show More Authors

Abstract Throughout this paper R represents commutative ring with identity and M is a unitary left R-module, the purpose of this paper is to study a new concept, (up to our knowledge), named St-closed submodules. It is stronger than the concept of closed submodules, where a submodule N of an R-module M is called St-closed (briefly N ≤Stc M) in M, if it has no proper semi-essential extensions in M, i.e if there exists a submodule K of M such that N is a semi-essential submodule of K then N = K. An ideal I of R is called St-closed if I is an St-closed R-submodule. Various properties of St-closed submodules are considered.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More