Preferred Language
Articles
/
2xcTUo8BVTCNdQwC2Wsc
On J–Lifting Modules
...Show More Authors
Abstract<p>Let R be a ring with identity and M is a unitary left R–module. M is called J–lifting module if for every submodule N of M, there exists a submodule K of N such that <inline-formula> <tex-math><?CDATA ${\rm{M}} = {\rm{K}} \oplus \mathop {\rm{K}}\limits^\prime,\>\mathop {\rm{K}}\limits^\prime \subseteq {\rm{M}}$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block" overflow="scroll"> <mrow> <mi mathvariant="normal">M</mi> <mo>=</mo> <mi mathvariant="normal">K</mi> <mo>⊕</mo> <mover> <mi mathvariant="normal">K</mi> <mo>′</mo> </mover> <mo>,</mo> <mi mathvariant="normal"> </mi> <mover> <mi mathvariant="normal">K</mi> <mo>′</mo> </mover> <mo>⊆</mo> <mi mathvariant="normal">M</mi> </mrow> </math> <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="JPCS_1530_1_012025_ieqn1.gif" xlink:type="simple"></inline-graphic> </inline-formula> and <inline-formula> <tex-math><?CDATA ${\rm{N}} \cap \mathop {\rm{K}}\limits^\prime { \ll _{\rm{J}}}\mathop {\rm{K}}\limits^\prime $?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" overflow="scroll"> <mrow> <mi mathvariant="normal">N</mi> <mo>∩</mo> <mover> <mi mathvariant="normal">K</mi> <mo>′</mo> </mover> <msub> <mo>≪</mo> <mi mathvariant="normal">J</mi> </msub> <mover> <mi mathvariant="normal">K</mi> <mo>′</mo> </mover> </mrow> </math> <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="JPCS_1530_1_012025_ieqn2.gif" xlink:type="simple"></inline-graphic> </inline-formula>. The am of this paper is to introduce properties of J–lifting modules. Especially, we give characterizations of J–lifting modules.We introduce J–coessential submodule as a generalization of coessential submodule . Finally, we give some conditions under which the quotient and direct sum of J–lifting modules is J–lifting.</p>
Scopus Crossref
View Publication
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent &amp; Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The influence of human resources Accounting on cost reduction
...Show More Authors

The development of human resources training programs has an applied and important role in the preparation of human cadresin terms of capacity to absorb technical sciences and skills and scientific and practical practices at faster rates in order to bealighed with continous development. Hence the recognition of the significant role that human resources play in the economy of any country,which has stressed the interest towards the economic unity of the qualified staff that it needsin atimely manner through the ongoing training process in the era of high technology day by  day  In this regard ,the current research deal with accounting of human resources and its impact on reducing costs in the military establishment and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Internal Marketing on Organizational Citizenship Behavior
...Show More Authors

The aim of this paper is to determine the effect of internal marketing through three dimensions: vision, development, and reward - on organizational citizenship behavior in three private universities in Iraq. Organizations’ view of their members as internal customers could be made them more realistic in dealing with the reasons for leaving and going to other organizations. This can promote business organizations to build an organizational environment that contributes to making the organization look like the homeland of those workers. The research method is descriptive and analytical. The tool for data collection was the questionnaire. Statistical software (SPSS V.23 and AMOS V.23) was used to analyze the data. The research sample was r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
A survey on video compression fast block matching algorithms
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Analysis the Impact of Corruption on Investment in Iraq
...Show More Authors

There are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth.  The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects.  In additio

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iosr-jdms
The Effect of Fixed Orthodontic Appliances on Gingival Health
...Show More Authors

Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Fast Lossless Compression of Medical Images based on Polynomial
...Show More Authors

In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref