Number theorists believe that primes play a central role in Number theory and that solving problems related to primes could lead to the resolution of many other unsolved conjectures, including the prime k-tuples conjecture. This paper aims to demonstrate the existence of this conjecture for admissible k-tuples in a positive proportion. The authors achieved this by refining the methods of “Goldston, Pintz and Yildirim” and “James Maynard” for studying bounded gaps between primes and prime k-tuples. These refinements enabled to overcome the previous limitations and restrictions and to show that for a positive proportion of admissible k-tuples, there is the existence of the prime k-tuples conjecture holding for each “k”. The significance of this result is that it is unconditional which means it is proved without assuming any form of strong conjecture like the Elliott–Halberstam conjecture
Let be a prime ring, be a non-zero ideal of and be automorphism on. A mapping is called a multiplicative (generalized) reverse derivation if where is any map (not necessarily additive). In this paper, we proved the commutativity of a prime ring R admitting a multiplicative (generalized) reverse derivation satisfying any one of the properties:
for all x, y
Let R be a commutative ring with unity. And let E be a unitary R-module. This paper introduces the notion of 2-prime submodules as a generalized concept of 2-prime ideal, where proper submodule H of module F over a ring R is said to be 2-prime if , for r R and x F implies that or . we prove many properties for this kind of submodules, Let H is a submodule of module F over a ring R then H is a 2-prime submodule if and only if [N ] is a 2-prime submodule of E, where r R. Also, we prove that if F is a non-zero multiplication module, then [K: F] [H: F] for every submodule k of F such that H K. Furthermore, we will study the basic properties of this kind of submodules.
The imbalances and economic problems which it face the countries, it is a result of international economic developments or changes or global crises such as deterioration in trade, sharp changes in oil prices, increasing global indebtedness, sharp changes in foreign exchange rates and other changes, all that, they affect the economic features of any country. and These influences vary from one country to another according to the rigidity of its economy and its potential in maneuvering with economic plans and actions that would reduce the impact or avoidance with minimal damage. Therefore, the countries that suffer from accumulated economic problems as a result of mismanagement and poor planning or suffe
... Show MoreCo(II) ion was determined by a new, accurate, sensitive and rapid method via a
continuous flow injection analysis (CFIA) with a chemiluminescence reaction based on
the oxidation of Luminol which is loaded on poly acrylic acid gel beads by hydrogen
peroxide in presence of Cobalt (II) ion as a chemiluminescence catalyst. Chemical and
physical parameters were investigated to obtain the best conditions. Linear dynamic
range of Cobalt (II) ion was from 0.1-20.0 μg.ml-1 with a correlation coefficient r =
0.9758, limit of detection (L.O.D) 0.2 ng/sample from the step wise dilution of lowest
concentration in the calibration graph with the percentage relative standard deviation for
3 μg.ml-1 Co(ll) solution is 0.8537% (n
In this paper, we introduce the notion of a 2-prime module as a generalization of prime module E over a ring R, where E is said to be prime module if (0) is a prime submodule. We introduced the concept of the 2-prime R-module. Module E is said to be 2-prime if (0) is 2-prime submodule of E. where a proper submodule K of module E is 2-prime submodule if, whenever rR, xE, E, Thus xK or [K: E].
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreLet S be a prime inverse semiring with center Z(S). The aim of this research is to prove some results on the prime inverse semiring with (α, β) – derivation that acts as a homomorphism or as an anti- homomorphism, where α, β are automorphisms on S.
A non-zero module M is called hollow, if every proper submodule of M is small. In this work we introduce a generalization of this type of modules; we call it prime hollow modules. Some main properties of this kind of modules are investigated and the relation between these modules with hollow modules and some other modules are studied, such as semihollow, amply supplemented and lifting modules.
The main purpose of this paper, is to characterize new admissible classes of linear operator in terms of seven-parameter Mittag-Leffler function, and discuss sufficient conditions in order to achieve certain third-order differential subordination and superordination results. In addition, some linked sandwich theorems involving these classes had been obtained.