Preferred Language
Articles
/
ijs-4606
Neutrosophic d-Filter of d-Algebra
...Show More Authors

     In this article, an attempt has been made to introduce the concept of Neutrosophic d-Filter and Neutrosophic Prime d-Filter of d-Algebra by generalizing the notion of Intuitionistic Fuzzy d-Filter of d-Algebra. Besides, we establish different properties of them. Further, we study several relations on this notion from the point of view of Neutrosophic d-Algebra.

 

Scopus Crossref
View Publication
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Fully Prime Semimodule, Fully Essential Semimodule and Semi-Complement Subsemimodules
...Show More Authors

      The concept of semi-essential semimodule has been studied by many researchers.

     In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule  is prime, then  is fully prime. If every semi-essential subsemimodule of -semimodule  is essential then  is fully essential. Finally, a prime subsemimodule  of  is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule  in , if , and whenever  with  is a prime subsemimodule in , , then .  Furthermore, some res

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Pseudo Quasi-2-Absorbing Submodules and Some Related Concepts
...Show More Authors

Let R be a ring and let A be a unitary left R-module. A proper submodule H of an R-module A is called 2-absorbing , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H or rs∈[H:A], and a proper submodule H of an R-module A is called quasi-prime , if rsa∈H, where r,s∈R,a∈A, implies that either ra∈H or sa∈H. This led us to introduce the concept pseudo quasi-2-absorbing submodule, as a generalization of both concepts above, where a proper submodule H of an R-module A is called a pseudo quasi-2-absorbing submodule of A, if whenever rsta∈H,where r,s,t∈R,a∈A, implies that either rsa∈H+soc(A) or sta∈H+soc(A) or rta∈H+soc(A), where soc(A) is socal of an

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Discrete Mathematical Sciences & Cryptography
On β*-supra topological spaces
...Show More Authors

In this paper, a new type of supra closed sets is introduced which we called supra β*-closed sets in a supra topological space. A new set of separation axioms is defined, and its many properties are examined. The relationships between supra β*-Ti –spaces (i = 0, 1, 2)   are studied and shown with instances. Additionally, new varieties of supra β*-continuous maps have been taken into consideration based on the supra β*-open sets theory. 

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Results via Gril Semi –p-Open Set
...Show More Authors

The significance of the work is to introduce the new class of open sets, which is said Ǥ- -open set with some of properties. Then clarify how to calculate the boundary area for these sets using the upper and lower approximation and obtain the best accuracy.

View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
L- pre-open and L-semi-p-open Sets
...Show More Authors

   The purpose of this paper is to study   new  types of open sets in bitopological spaces.    We shall introduce the concepts of  L- pre-open and L-semi-p-open sets

View Publication Preview PDF
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Nano ẛـpreـgـOpen Set
...Show More Authors

      In this work, the notion is defined by using    and some properties of this set are studied also,  and   Ù€ set are two concepts that are defined by using ; many examples have been cited to indicate that the reverse of the propositions and remarks is not achieved. In addition, new application example of nano was studied.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Mathematical Model of Effect of Number of Pulses of Pulsed Laser on Formation Process of Plasma
...Show More Authors

The effect of number of pulses of pulsed laser on materials is studied analytically, different pulses has been used with the same delay time.  The depth of possible damage to the surface of copper and titanium as well as depth of the crater to both materials were considered in this study.  The study revealed that linear model is only possible when estimating depth of possible damage for copper material, this means that the depth of possible damage increases with the increment of number of laser pulses .As for titanium material, it is found  the relationship is nonlinear.  The depth of possible damage of titanium and copper is not the same, and copper seems to be more predictable than titanium.  
 

View Publication Preview PDF
Publication Date
Sun Oct 03 2021
Journal Name
Journal Of Interdisciplinary Mathematics
Fibrewise soft bitopological spaces
...Show More Authors

We introduce and discuss recent type of fibrewise topological spaces, namely fibrewise soft bitopological spaces. Also, we introduce the concepts of fibrewise closed soft bitopological spaces, fibrewise open soft bitopological spaces, fibrewise locally sliceable soft bitopological spaces and fibrewise locally sectionable soft bitopological spaces. Furthermore, we state and prove several propositions concerning these concepts.

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On bg**- Connected Spaces
...Show More Authors

  In this paper, we define the bg**-connected space and study the relation between this space and other kinds of connected spaces .Also we study some types of continuous functions and study the relation among (connected space, b-connected space,  bg-connected  space and bg**-connected space) under these types of continuous functions.  

View Publication Preview PDF