Preferred Language
Articles
/
ijs-1012
On Weakly Second Submodules

    Let  be a non-zero right module over a ring  with identity. The weakly second submodules is studied in this paper. A non-zero submodule  of   is weakly second Submodule when  ,  where ,  and  is a submodule of  implies either  or   . Some connections between these modules and other related modules are investigated and number of conclusions  and characterizations are gained.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
ON ECS modules

Let R be commutative ring with identity and let M be any unitary left R-module. In this paper we study the properties of ec-closed submodules, ECS- modules and the relation between ECS-modules and other kinds of modules. Also, we study the direct sum of ECS-modules.

View Publication Preview PDF
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
ON RICKART MODULES

Gangyong Lee, S.Tariq Rizvi, and Cosmin S.Roman studied Rickart modules.

The main purpose of this paper is to develop the properties of Rickart modules .

We prove that each injective and prime module is a Rickart module. And we give characterizations of some kind of rings in term of Rickart modules.

Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Max-Modules

   In this paper ,we introduce a concept of Max– module as follows: M is called a Max- module if ann N R is a maximal ideal of R, for each non– zero submodule N of M;       In other words, M is a Max– module iff (0) is a *- submodule, where  a proper submodule N of M is called a *- submodule if [ ] : N K R is a maximal ideal of R, for each submodule K contains N properly.       In this paper, some properties and characterizations of max– modules and  *- submodules are given. Also, various basic results a bout Max– modules are considered. Moreover, some relations between max- modules and other types of modules are considered.

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
Scopus (5)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On maps of Γ -period 2 on prime Γ- near-rings

We present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Scopus Crossref
View Publication
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Study on the Effect of Ambient Temperature on Absorption Coefficient

 Anew mathematical formula was proposed to describe the behavior of the extinction coefficient as a function of ambient temperature and wavelengths for some of infrared materials. This formula was derived depending on some experimental data of transmittance spectrum versus wavelengths for many ambient temperatures. The extensive study of the spectrum characteristics and depending on Bose-Einstein distribution led to derive an equation connecting the extinction coefficient or the absorption coefficient with the ambient temperature and wavelengths of the incident rays. The basic assumption in deriving process is the decreasing in transmittance value with the increasing temperature which is only due to the changing in extinction coeffi

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
A Review on Face Detection Based on Convolution Neural Network Techniques

     Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method. 

Scopus (6)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
View Publication