Throughout this paper, we introduce the notion of weak essential F-submodules of F-modules as a generalization of weak essential submodules. Also we study the homomorphic image and inverse image of weak essential F-submodules.
We introduce in this paper the concept of approximaitly semi-prime submodules of unitary left -module over a commutative ring with identity as a generalization of a prime submodules and semi-prime submodules, also generalization of quasi-prime submodules and approximaitly prime submodules. Various basic properties of an approximaitly semi-prime submodules are discussed, where a proper submodule of an -module is called an approximaitly semi-prime submodule of , if whenever , where , and , implies that . Furthermore the behaviors of approximaitly semi-prime submodule in some classes of modules are studied. On the other hand several characterizations of this concept are
... Show MoreLet R be a commutative ring with unity and let M be a unitary R-module. Let N be a proper submodule of M, N is called a coprime submodule if ï ïŽ is a coprime R-module, where ï ïŽ is a coprime R-module if for any r  R, either O  ï ïŽ ï ïŽ r or  ï ïŽ ï ïŽr . In this paper we study coprime submodules and give many properties related with this concept.
In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe aims of the paper are to present a modified symmetric fuzzy approach to find the best workable compromise solution for quadratic fractional programming problems (QFPP) with fuzzy crisp in both the objective functions and the constraints. We introduced a modified symmetric fuzzy by proposing a procedure, that starts first by converting the quadratic fractional programming problems that exist in the objective functions to crisp numbers and then converts the linear function that exists in the constraints to crisp numbers. After that, we applied the fuzzy approach to determine the optimal solution for our quadratic fractional programming problem which is supported theoretically and practically. The computer application for the algo
... Show MoreQuality is one of the important criteria to determine the success of product. So quality control is required for all stages of production to ensure a good final product with lowest possible losses. Control charts are the most important means used to monitor the quality and its accuracy is measured by quickly detecting unusual changes in the quality to maintain the product and reduce the costs and losses that may result from the defective items. There are different types of quality control charts and new types appeases involving the concept of fuzziness named multinomial fuzzy quality control chart (FM) , dividing the product to accepted and not may not be accurate therefore adding fuzziness concept to quality charts confirm and a
... Show MoreThe main focus of this research is to examine the Travelling Salesman Problem (TSP) and the methods used to solve this problem where this problem is considered as one of the combinatorial optimization problems which met wide publicity and attention from the researches for to it's simple formulation and important applications and engagement to the rest of combinatorial problems , which is based on finding the optimal path through known number of cities where the salesman visits each city only once before returning to the city of departure n this research , the benefits of( FMOLP) algorithm is employed as one of the best methods to solve the (TSP) problem and the application of the algorithm in conjun
... Show MoreAbstract
An experimental study was conducted for measuring the quality of surface finishing roughness using magnetic abrasive finishing technique (MAF) on brass plate which is very difficult to be polish by a conventional machining process where the cost is high and much more susceptible to surface damage as compared to other materials. Four operation parameters were studied, the gap between the work piece and the electromagnetic inductor, the current that generate the flux, the rotational Spindale speed and amount of abrasive powder size considering constant linear feed movement between machine head and workpiece. Adaptive Neuro fuzzy inference system (ANFIS) was implemented for evaluation of a serie
... Show More