Weosay thatotheosubmodules A, B ofoan R-module Moare µ-equivalent , AµB ifoand onlyoif <<µand <<µ. Weoshow thatoµ relationois anoequivalent relationoand hasegood behaviorywith respectyto additionmof submodules, homorphismsr, andydirectusums, weaapplyothese resultsotoointroduced theoclassoof H-µ-supplementedomodules. Weosay thatoa module Mmis H-µ-supplementedomodule ifofor everyosubmodule A of M, thereois a directosummand D ofoM suchothat AµD. Variousoproperties ofothese modulesoarepgiven.
In this paper, we will generalized some results related to centralizer concept on
prime and semiprime Γ-rings of characteristic different from 2 .These results
relating to some results concerning left centralizer on Γ-rings.
Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
Single crystals of pure and Cu+2,Fe+2 doped potassium sulfate were grown from aqueous solutions by the slow evaporation technique at room temperature. with dimension of (11x9 x4)mm3 and ( 10x 8x 5)mm3 for crystal doping with Cu &Fe respectively. The influence of doping on crystal growth and its structure revealed a change in their lattice parameters(a=7.479 Ã… ,b=10.079 Ã… ,c=5.772 Ã…)for pure and doping (a=9.687 Ã…, b=14.926 Ã… ,c= 9.125 Ã…) & (a=9.638 Ã… , b= 8.045 Ã… ,c=3.271 Ã…) for Cu & Fe respectively. Structure analysis of the grown crystals were obtained by X-Ray powder diffraction measurements. The diffraction patterns were analyzed by the Rietveld refinement method. Rietveld refinement plo
... Show MoreIn this paper, the Normality set will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of .
In this paper we introduce the definition of Lie ideal on inverse semiring and we generalize some results of Herstein about Lie structure of an associative rings to inverse semirings.
An algebra has been constructed from a (D, A)-stacked algebra A, under the conditions that , A 1 and . It is shown that when the construction of algebra B is built from a (D, A)-stacked monomial algebra A then B is a d-Koszul monomial algebra.
The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism .
Let S be a prime inverse semiring with center Z(S). The aim of this research is to prove some results on the prime inverse semiring with (α, β) – derivation that acts as a homomorphism or as an anti- homomorphism, where α, β are automorphisms on S.
In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluati
... Show MoreThis paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.
The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha
... Show More