We define a new concept, called " generalized right -derivation", in near-ring and obtain new essential results in this field. Moreover we improve this paper with examples that show that the assumptions used are necessary.
Throughout this paper, we introduce the notion of weak essential F-submodules of F-modules as a generalization of weak essential submodules. Also we study the homomorphic image and inverse image of weak essential F-submodules.
In this paper, as generalization of second modules we introduce type of modules namely (essentially second modules). A comprehensive study of this class of modules is given, also many results concerned with this type and other related modules presented.
The concept of semi-essential semimodule has been studied by many researchers.
In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule is prime, then is fully prime. If every semi-essential subsemimodule of -semimodule is essential then is fully essential. Finally, a prime subsemimodule of is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule in , if , and whenever with is a prime subsemimodule in , , then . Furthermore, some res
... Show MoreLet R be a ring and let A be a unitary left R-module. A proper submodule H of an R-module A is called 2-absorbing , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H or rs∈[H:A], and a proper submodule H of an R-module A is called quasi-prime , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H. This led us to introduce the concept pseudo quasi-2-absorbing submodule, as a generalization of both concepts above, where a proper submodule H of an R-module A is called a pseudo quasi-2-absorbing submodule of A, if whenever rsta∈H,where r,s,t∈R,a∈A, implies that either rsa∈H+soc(A) or sta∈H+soc(A) or rta∈H+soc(A), where soc(A) is socal of an
... Show MoreAn extensive program of laboratory testing was conducted on ring footing rested on gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59%. There are limited researches available, and even fewer have been done experimentally to understand how to ring footings behave; almost all the previous works only concern the behavior of ring footing under vertical loads, Moreover, relatively few studies have examined the impact of eccentric load and inclined load on such footing. In this study, a series of tests, including dry and wet tests, were carried out using a steel container (600×600×600) mm, metal ring footing (100 mm outer diameter and 40 mm inner diameter) was placed in the m
... Show MoreThe present study was performed to evaluate the anti-fungal effect of alcoholic extract of Solanum nigrum (AESn) on the growth of Microsporum canis, the causes agent of ring worm. The results of this work referred to the inhibitory effect of the studied extract on the growth of tested fungi. The percentages of inhibition were (7.88 %, 19.88%, 23.41%, 57.65%), in comparison to the control, when (2%, 4%, 6%,8% ) of tested extract were used, respectively. The data illustrated that the higher concentrations of the extract are applied, the more inhibition of fungal growth is produced.
In this paper we introduce the notion of semiprime fuzzy module as a generalization of semiprime module. We investigate several characterizations and properties of this concept.
As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreLet be a commutative ring with identity, and be a unitary left -module. In this paper we introduce the concept pseudo weakly closed submodule as a generalization of -closed submodules, where a submodule of an -module is called a pseudo weakly closed submodule, if for all , there exists a -closed submodule of with is a submodule of such that . Several basic properties, examples and results of pseudo weakly closed submodules are given. Furthermore the behavior of pseudo weakly closed submodules in class of multiplication modules are studied. On the other hand modules with chain conditions on pseudo weakly closed submodules are established. Also, the relationships of pseudo weakly closed
... Show MoreAbstract Throughout this paper R represents commutative ring with identity and M is a unitary left R-module, the purpose of this paper is to study a new concept, (up to our knowledge), named St-closed submodules. It is stronger than the concept of closed submodules, where a submodule N of an R-module M is called St-closed (briefly N ≤Stc M) in M, if it has no proper semi-essential extensions in M, i.e if there exists a submodule K of M such that N is a semi-essential submodule of K then N = K. An ideal I of R is called St-closed if I is an St-closed R-submodule. Various properties of St-closed submodules are considered.