Preferred Language
Articles
/
jih-779
On Fully Semiprime Submodules and Fully Semiprime Modules
...Show More Authors

   Let R be a commutative ring with unity and let M be a unitary R-module. In this paper we study fully semiprime submodules and fully semiprime modules, where a proper fully invariant R-submodule W of M is called fully semiprime in M if whenever XXW for all fully invariant R-submodule X of M, implies XW.         M is called fully semiprime if (0) is a fully semiprime submodule of M. We give basic properties of these concepts. Also we study the relationships between fully semiprime submodules (modules) and other related submodules (modules) respectively.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On Fully (m,n)-stable modules relative to an ideal A of
...Show More Authors

Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Jordan ?-Centralizers of Prime and Semiprime Rings
...Show More Authors

The purpose of this paper is to prove the following result: Let R be a 2-torsion free ring and T: R?R an additive mapping such that T is left (right) Jordan ?-centralizers on R. Then T is a left (right) ?-centralizer of R, if one of the following conditions hold (i) R is a semiprime ring has a commutator which is not a zero divisor . (ii) R is a non commutative prime ring . (iii) R is a commutative semiprime ring, where ? be surjective endomorphism of R . It is also proved that if T(x?y)=T(x)??(y)=?(x)?T(y) for all x, y ? R and ?-centralizers of R coincide under same condition and ?(Z(R)) = Z(R) .

View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
On (ɱ,ɳ)-Strongly Fully Stably Banach Algebra Modules Related to an Ideal of Am ×ɳ
...Show More Authors

The aim of this paper is introducing the concept of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal. Some properties of (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal have been studied and another characterizations have been given. The relationship of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal that states,  a B- -module Ӽ is (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal  , if and only if  for any two ɱ-element sub-sets and of Ӽɳ, if , for each j = 1, …, ɱ,  i = 1,…, ɳ  and   implies ɳ( ) ɳ(  have been proved..

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Orthogonal Symmetric Higher bi-Derivations on Semiprime Г-Rings
...Show More Authors

   Let M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.

View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Dependent Element and Free Actions of Centralizer and Reverse Centralizer on Prime and Semiprime Semirings
...Show More Authors

     This paper develops the work of Mary Florence et.al. on centralizer of semiprime semirings and presents reverse centralizer of semirings with several propositions and lemmas. Also introduces the notion of dependent element and free actions on semirings with some results of free action of centralizer and reverse centralizer on semiprime semirings and some another mappings.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Semi-group Ideals on prime and semiprime Γ-Near - Rings with Γ- (λ,δ) – derivations
...Show More Authors
Abstract<p>Let h is Γ<sub>−(λ,δ) –</sub> derivation on prime Γ<sub>−</sub>near-ring G and K be a nonzero semi-group ideal of G and δ(K) = K, then the purpose of this paper is to prove the following :- (a) If λ is onto on G, λ(K) = K, λ(0) = 0 and h acts like Γ<sub>−</sub>hom. or acts like anti–Γ<sub>−</sub>hom. on K, then h(K) = {0}.(b) If h + h is an additive on K, then (G, +) is abelian.</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref