Let be a ring with identity. Recall that a submodule of a left -module is called strongly essential if for any nonzero subset of , there is such that , i.e., . This paper introduces a class of submodules called se-closed, where a submodule of is called se-closed if it has no proper strongly essential extensions inside . We show by an example that the intersection of two se-closed submodules may not be se-closed. We say that a module is have the se-Closed Intersection Property, briefly se-CIP, if the intersection of every two se-closed submodules of is again se-closed in . Several characterizations are introduced and studied for each of these concepts. We prove for submodules and of that a module has the se-CIP if and only if is strongly essential in implies is strongly essential in . Also, we verify that, a module has the se-CIP if and only if for each se-closed submodule of and for all submodule of , is se-closed in . Finally, some connections and examples are included about (se-CIP)-modules
This work, introduces some concepts in bitopological spaces, which are nm-j-ω-converges to a subset, nm-j-ω-directed toward a set, nm-j-ω-closed mappings, nm-j-ω-rigid set, and nm-j-ω-continuous mappings. The mainline idea in this paper is nm-j-ω-perfect mappings in bitopological spaces such that n = 1,2 and m =1,2 n ≠ m. Characterizations concerning these concepts and several theorems are studied, where j = q , δ, a , pre, b, b.
In this paper normal self-injective hyperrings are introduced and studied. Some new relations between this concept and essential hyperideal, dense hyperideal, and divisible hyperring are studied.
The idea of ech fuzzy soft bi-closure space ( bicsp) is a new one, and its basic features are defined and studied in [1]. In this paper, separation axioms, namely pairwise, , pairwise semi-(respectively, pairwise pseudo and pairwise Uryshon) - fs bicsp's are introduced and studied in both ech fuzzy soft bi-closure space and their induced fuzzy soft bitopological spaces. It is shown that hereditary property is satisfied for , with respect to ech fuzzy soft bi-closure space but for other mentioned types of separations axioms, hereditary property satisfies for closed subspaces of ech fuzzy soft bi-closure space.
six specimens of the Hg0.5Pb0.5Ba2Ca2Cu3-y
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The research is a vision of the future of industry in Iraq, so it is may be outside the ceiling of the capabilities of the Iraqi economy, and therefore it is exaggerated. Therefore, future plans must be applicable through the availability of capabilities. Everyone knows that the financial and administrative corruption and mismanagement of resources are the main cause of the inefficiency of the industrial sector, and the failure to exercise its real role in achieving economic development.; as well as the political situation and the dominance of parties and their insistence on addressing positions that have a strong relationship in managing the economic sector that has a significant impact on drawing the economic map in its current
... Show MoreThe main aim of this paper is to use the notion which was introduced in [1], to offered new classes of separation axioms in ideal spaces. So, we offered new type of notions of convergence in ideal spaces via the set. Relations among several types of separation axioms that offered were explained.
Abstract The study aimed at reviewing translation theories proposed to address problems in translation studies. To the end, translation theories and their applications were reviewed in different studies with a focus on issues such as critical discourse analysis, cultural specific items and collocation translation.
In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained