In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
The theory of general topology view for continuous mappings is general version and is applied for topological graph theory. Separation axioms can be regard as tools for distinguishing objects in information systems. Rough theory is one of map the topology to uncertainty. The aim of this work is to presented graph, continuity, separation properties and rough set to put a new approaches for uncertainty. For the introduce of various levels of approximations, we introduce several levels of continuity and separation axioms on graphs in Gm-closure approximation spaces.
The present paper agrees with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using suitable shrinkage weight factor and region. The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator are performed .The results are presented in attached tables.
Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreThe effects of shot peening treatment (SPT) were studied at (10,20, and 30) minutes on the rotating bending fatigue behavior and the behavior of the alloy steel DIN 41Cr4 vibrations. The hardness test, tensile test, constant amplitude fatigue tests, and the vibration measurements were performed on samples with and without cracks at room temperature (RT), also, the fracture surface was examined and analyzed by a Scanning Electron Microscope (SEM). The results of the investigations, for example, Stress to Number of cycles to failure (S-N) curves, fatigue strength improvement factor of 5% to 10%, the decreasing percentage of maximum Fast Fourier Transform (FFT) acceleration of the shot-peened condition were compared to untr
... Show MoreThe concept of semi-essential semimodule has been studied by many researchers.
In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule is prime, then is fully prime. If every semi-essential subsemimodule of -semimodule is essential then is fully essential. Finally, a prime subsemimodule of is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule in , if , and whenever with is a prime subsemimodule in , , then . Furthermore, some res
... Show MoreIn this paper, the classical continuous triple optimal control problem (CCTOCP) for the triple nonlinear parabolic boundary value problem (TNLPBVP) with state vector constraints (SVCs) is studied. The solvability theorem for the classical continuous triple optimal control vector CCTOCV with the SVCs is stated and proved. This is done under suitable conditions. The mathematical formulation of the adjoint triple boundary value problem (ATHBVP) associated with TNLPBVP is discovered. The Fréchet derivative of the Hamiltonian" is derived. Under suitable conditions, theorems of necessary and sufficient conditions for the optimality of the TNLPBVP with the SVCs are stated and proved.
The major target of this paper is to study a confirmed class of meromorphic univalent functions . We procure several results, such as those related to coefficient estimates, distortion and growth theorem, radii of starlikeness, and convexity for this class, n additionto hadamard product, convex combination, closure theorem, integral operators, and neighborhoods.
The chemical additives used to enhance the properties of drilling mud cause damage to humans and the environment. Therefore, it is necessary to search for alternative additives to add them to the drilling mud. Thus, this study investigates the effects of pomegranate peel and grape seed powders as natural waste when added to un-weighted water-based mud. The test includes measurements of the rheological properties and filtration, as well as the alkanity and density of the drilling mud. The results showed a decrease in PH values with an increase in the concentrations of pomegranate peel or grapeseed, and a decrease in mud density with an increase in powders of pomegranate peel and grape seed concentrations that resulted f
... Show MoreIn this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, which are useful in water quality management and decision making. The application of Water Quality Index (WQI) with ten physicochemical water quality parameters was performed to evaluate the quality of Euphrates River water for drinking usage. This was done by subjecting the water samples collected from seven stations within Al-Anbar province during the period 2004-2010 to comprehensive physicochemical analysis. The ten physicochemical parame
... Show More