The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software, as an indicator of copyright ownership for this software. In this paper, the watermarked software will be explained in detail by defining the classification of watermarks software, models of attack, and methods used in software watermarking carried out by several researchers. It seems clearly that the method of ROP algorithm has given the highest accuracy results up to 100%
We introduce in this paper the concept of approximaitly semi-prime submodules of unitary left -module over a commutative ring with identity as a generalization of a prime submodules and semi-prime submodules, also generalization of quasi-prime submodules and approximaitly prime submodules. Various basic properties of an approximaitly semi-prime submodules are discussed, where a proper submodule of an -module is called an approximaitly semi-prime submodule of , if whenever , where , and , implies that . Furthermore the behaviors of approximaitly semi-prime submodule in some classes of modules are studied. On the other hand several characterizations of this concept are
... Show MoreLet be a commutative ring with identity. The aim of this paper is introduce the notion of a pseudo primary-2-absorbing submodule as generalization of 2-absorbing submodule and a pseudo-2-absorbing submodules. A proper submodule of an -module is called pseudo primary-2-absorbing if whenever , for , , implies that either or or . Many basic properties, examples and characterizations of these concepts are given. Furthermore, characterizations of pseudo primary-2-absorbing submodules in some classes of modules are introduced. Moreover, the behavior of a pseudo primary-2-absorbing submodul
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
In this paper, an attempt was made to measure and interpret the impact of several variables on global maritime transport, including: OECD industrial productions, high growth rates of some developing countries, and growth in world GDP. These variables contribute to higher rates of maritime transport revenues of 800 billion dollars annually; in the form of numerical sequences. The dry canal in Iraq was assumed to transfer 99 million tons of goods annually. This was made sure through the economic feasibility of the difference between maritime and land transport through railways. The effect of geographical and anthropological nature of Iraq on this project was studied too. Our findings indicated that the project will not drive growth
... Show MoreLet G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric
In this paper, we prove some coincidence and common fixed point theorems for a pair of discontinuous weakly compatible self mappings satisfying generalized contractive condition in the setting of Cone-b- metric space under assumption that the Cone which is used is nonnormal. Our results are generalizations of some recent results.
Soft closure spaces are a new structure that was introduced very recently. These new spaces are based on the notion of soft closure operators. This work aims to provide applications of soft closure operators. We introduce the concept of soft continuous mappings and soft closed (resp. open) mappings, support them with examples, and investigate some of their properties.
تهدف هذه الدراسة للتعرف على السياسات اإلاسرائيلية المتبعة على الارض والمتمثلة في االاستيطان
الاستعماري والطرق التفافية، ومصادرة الاراضي وجدار الضم والتوسع العنصري، بالاضافة إلى التصنيف
الاداري للمناطق في الضفة الغربية حسب ما جاء في اتفاقية أوسلو، والتي من شأنها التأثير على تلك
المناطق، وال سيما قطاع اإلسكان الذي يعد من أهم القطاعات التي تتر كب وبالتحديد في منطقة الدراسة،
وسوف تحاول هذه الدراسة تس
Let R be a commutative ring with identity and E be a unitary left R – module .We introduce and study the concept Weak Pseudo – 2 – Absorbing submodules as generalization of weakle – 2 – Absorbing submodules , where a proper submodule A of an R – module E is called Weak Pseudo – 2 – Absorbing if 0 ≠rsx A for r, s R , x E , implies that rx A + soc ( E ) or sx A + soc (E) or rs [ A + soc ( E ) E ]. Many basic properties, char
... Show More