In this paper, we introduce the concepts of higher reverse left (resp.right) centralizer, Jordan higher reverse left (resp. right) centralizer, and Jordan triple higher reverse left (resp. right) centralizer of G-rings. We prove that every Jordan higher reverse left (resp. right) centralizer of a 2-torsion free prime G-ring M is a higher reverse left (resp. right) centralizer of M.
In this paper, we will show that the Modified SP iteration can be used to approximate fixed point of contraction mappings under certain condition. Also, we show that this iteration method is faster than Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Furthermore, by using the same condition, we shown that the Picard S- iteration method converges faster than Modified SP iteration and hence also faster than all Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Finally, a data dependence result is proven for fixed point of contraction mappings with the help of the Modified SP iteration process.
Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p
... Show MoreWhen exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThe evaluation and efficiency and effectiveness of account system for the department of delegation and cultural Relationships in the center of ministry of higher Education and Scientific research Considered as a very important and active subjects in the modification of accounting system in this department and to develop it and make it able to make available important and accurate information for the planning requirements and monetary and evaluation performance and to make decisions, besides to develop the performance of Iraqi Cultural departments working abroad and to render its role effective to serve the students of higher education in the progressive Countries to facility its growing in scientific and professional and technica
... Show MoreIn this paper we introduce the notions of bi-ideal with respect to an element r
denoted by (r-bi- ideal ) of a near ring , and the notion fuzzy bi- ideal with respect
to an element of a near ring and the relation between F-r-bi-ideal and r-bi-ideal of
the near ring, we studied the image and inverse image of r-bi- ideal under
epimomorphism ,the intersection of r-bi- ideals and the relation between this ideal
and the quasi ideal of a near ring, also we studied the notion intuitionistic fuzzy biideal
with respect to an element r of the near ring N, and give some theorem about
this ideal .
Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More