Our active aim in this paper is to prove the following Let Ŕ be a ring having an
idempotent element e(e 0,e 1) . Suppose that R is a subring of Ŕ which
satisfies:
(i) eR R and Re R .
(ii) xR 0 implies x 0 .
(iii ) eRx 0 implies x 0( and hence Rx 0 implies x 0) .
(iv) exeR(1 e) 0 implies exe 0 .
If D is a derivable map of R satisfying D(R ) R ;i, j 1,2. ij ij Then D is
additive. This extend Daif's result to the case R need not contain any non-zero
idempotent element.
It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreLet M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.
Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
Chacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This paper proposes an improvement of chaha20 stream cypher algorithm based on tent and Chebyshev functions (IChacha20). The main objectives of the proposed IChacha20 algorithm are increasing security layer, designing a robust structure of the IChacha20 to be enabled to resist various types of attacks, implementing the proposed algorithm for encryption of colour images, and transiting it in a secure manner. The test results proved that the MSE, PSNR, UQI and NCC metrics
... Show MoreThe concepts of nonlinear mixed summable families and maps for the spaces that only non-void sets are developed. Several characterizations of the corresponding concepts are achieved and the proof for a general Pietsch Domination-type theorem is established. Furthermore, this work has presented plenty of composition and inclusion results between different classes of mappings in the abstract settings. Finally, a generalized notation of mixing maps and their characteristics are extended to a more general setting.
Abstract In this work we introduce the concept of approximately regular ring as generalizations of regular ring, and the sense of a Z- approximately regular module as generalizations of Z- regular module. We give many result about this concept.
Let
be an
module, and let
be a set, let
be a soft set over
. Then
is said to be a fuzzy soft module over
iff
,
is a fuzzy submodule of
. In this paper, we introduce the concept of fuzzy soft modules over fuzzy soft rings and some of its properties and we define the concepts of quotient module, product and coproduct operations in the category of
modules.
Zadah in [1] introduced the notion of a fuzzy subset A of a nonempty set S as a mapping from S into [0,1], Liu in [2] introduced the concept of a fuzzy ring, Martines [3] introduced the notion of a fuzzy ideal of a fuzzy ring. A non zero proper ideal I of a ring R is called an essential ideal if I  J  (0), for any non zero ideal J of R, [4]. Inaam in [5] fuzzified this concept to essential fuzzy ideal of fuzzy ring and gave its basic properties. Nada in [6] introduced and studied notion of semiessential ideal in a ring R, where a non zero i
... Show MoreThe concept of semi-essential semimodule has been studied by many researchers.
In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule is prime, then is fully prime. If every semi-essential subsemimodule of -semimodule is essential then is fully essential. Finally, a prime subsemimodule of is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule in , if , and whenever with is a prime subsemimodule in , , then . Furthermore, some res
... Show MoreIn this paper a Г-ring M is presented. We will study the concept of orthogonal generalized symmetric higher bi-derivations on Г-ring. We prove that if M is a 2-torsion free semiprime Г-ring , and are orthogonal generalized symmetric higher bi-derivations associated with symmetric higher bi-derivations respectively for all n ϵN.