The concept of closed quasi principally injective acts over monoids is introduced ,which signifies a generalization for the quasi principally injective as well as for the closed quasi injective acts. Characterization of this concept is intended to show the behavior of a closed quasi principally injective property. At the same time, some properties of closed quasi principally injective acts are examined in terms of their endomorphism monoid. Also, the characterization of a closed self-principally injective monoid is given in terms of its annihilator. The relationship between the following concepts is also studied; closed quasi principally injective acts over monoids, Hopfian, co Hopfian, and directly finite property. Ultimately, based on the results obtained, the conditions on subacts to inherit a closed quasi principally injective property were shown. Part of this paper was dedicated to studying the relationship between the classes of closed quasi principally injective acts with some generalizations of injectivity. Conclusions and future remarks of this work are given.
Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreThe study of torsion {torsion free) fuzzy modules over fuzzy
integtal domain as a generalization oftorsion (torsion free) modules.
Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreIn this paper we generalize Jacobsons results by proving that any integer in is a square-free integer), belong to . All units of are generated by the fundamental unit having the forms
Our generalization build on using the conditions
This leads us to classify the real quadratic fields into the sets Jacobsons results shows that and Sliwa confirm that and are the only real quadratic fields in .
The aim of this paper is the study of the influence of magnetic field on unsteady
flow of the second-grade fluid with constant viscosity. The equations which
controlled this type of fluid flow are complicated, so finding an analytical solution is
not easy, because it is a system of partial differential equations.We obtained an
expression for the velocity by using homotopy analysis method HAM.
It is found that the equations motion are controlled by many dimensionless
parameter, namely magnetic field parameter M and material constant α,
dimensionless film thickness β and unsteadiness parameter S.We have been studied
the influence of all the physical parameters, that mentioned above on the velocity
field, also a
PDBN Rashid, Multidisciplinary International Journal, 2023
An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreIn this paper, the air pollutants concentrations measurements such as Total
Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and
meteorological parameters including temperature (T), relative humidity (RH) and
wind speed & direction were conducted in Baghdad city by several stations
measuring numbered (22) stations located in different regions, and were classified
into (industrial, commercial and residential) stations. The results show that the
concentrations of pollutants (TSP, CO, and CO2) have exceeded the air quality
standards set by World Health Organization (WHO) and Iraqi limitation in the
stations of the Baghdad city. The program (ArcGIS) used to prepare maps of air
pollution in Ba
In this work, we construct complete (K, n)-arcs in the projective plane over Galois field GF (11), where 12 2 ≤ ≤ n ,by using geometrical method (using the union of some maximum(k,2)- Arcs , we found (12,2)-arc, (19,3)-arc , (29,4)-arc, (38,5)-arc , (47,6)-arc, (58,7)-arc, (68,6)-arc, (81,9)-arc, (96,10)-arc, (109,11)-arc, (133,12)-arc, all of them are complete arc in PG(2, 11) over GF(11).