Let R be a commutative ring with unity and let M be a unitary R-module. In this paper we study fully semiprime submodules and fully semiprime modules, where a proper fully invariant R-submodule W of M is called fully semiprime in M if whenever XXïƒW for all fully invariant R-submodule X of M, implies XïƒW. M is called fully semiprime if (0) is a fully semiprime submodule of M. We give basic properties of these concepts. Also we study the relationships between fully semiprime submodules (modules) and other related submodules (modules) respectively.
Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
The purpose of this paper is to prove the following result: Let R be a 2-torsion free ring and T: R?R an additive mapping such that T is left (right) Jordan ?-centralizers on R. Then T is a left (right) ?-centralizer of R, if one of the following conditions hold (i) R is a semiprime ring has a commutator which is not a zero divisor . (ii) R is a non commutative prime ring . (iii) R is a commutative semiprime ring, where ? be surjective endomorphism of R . It is also proved that if T(x?y)=T(x)??(y)=?(x)?T(y) for all x, y ? R and ?-centralizers of R coincide under same condition and ?(Z(R)) = Z(R) .
Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
The aim of this paper is introducing the concept of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal. Some properties of (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal have been studied and another characterizations have been given. The relationship of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal that states, a B- -module Ӽ is (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal , if and only if for any two ɱ-element sub-sets and of Ӽɳ, if , for each j = 1, …, ɱ, i = 1,…, ɳ and implies Ạɳ( ) Ạɳ( have been proved..
Let M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.
This paper develops the work of Mary Florence et.al. on centralizer of semiprime semirings and presents reverse centralizer of semirings with several propositions and lemmas. Also introduces the notion of dependent element and free actions on semirings with some results of free action of centralizer and reverse centralizer on semiprime semirings and some another mappings.
Let h is Γ−(λ,δ) – derivation on prime Γ−near-ring G and K be a nonzero semi-group ideal of G and δ(K) = K, then the purpose of this paper is to prove the following :- (a) If λ is onto on G, λ(K) = K, λ(0) = 0 and h acts like Γ−hom. or acts like anti–Γ−hom. on K, then h(K) = {0}.(b) If h + h is an additive on K, then (G, +) is abelian.
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.