Preferred Language
Articles
/
bsj-2447
On Fully Stable Banach Algebra Modules and Fully Pesudo Stable Banach Algebra Modules
...Show More Authors

The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The contributions of Arab scientists In (algebra)
...Show More Authors

Research summary

Praise be to God, and prayers and peace be upon our master Muhammad, his family and companions until the Day of Judgment.

As for after:

It is the right of every nation to take care of its scientific heritage, and to reveal its human civilizational impact, and the Arabs are the richest nations in heritage, as they had in every period of time a sign and pride, the Arabs fulfilled their duty towards humanity, and they carried out a large part of their scientific activity towards humanity.

Therefore, highlighting some of the scientific aspects of the civilized activity of the Arabs, and removing some of the illusions spread by some malicious people, is a human duty before it is a national duty.

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Hyper Fuzzy AT-ideals of AT-algebra
...Show More Authors
Abstract<p>The aim of this paper is to introduce the notion of hyper fuzzy AT-ideals on hyper AT-algebra. Also, hyper fuzzy AT-subalgebras and fuzzy hyper AT-ideal of hyper AT-algebras are studied. We study on the fuzzy theory of hyper AT-subalgebras and hyper AT-ideal of hyper AT-algebras. Furthermore, the fuzzy set theory of the (weak, strong, s-weak) hyper fuzzy ATideals in hyper AT-algebras are applied and the relations among them are obtained.</p>
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Cubic bipolar ideals of a TM-algebra
...Show More Authors

This paper refers to studying some types of ideals, specifically cubic bipolar ideals and cubic bipolar T-ideals of TM algebra. It also introduces a cubic bipolar sub-TM-algebra and several important properties of these concepts. The relationships between these ideals and characterizations of cubic bipolar T-ideals are investigated.

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Algebra Letters
THE GRAPH OF A COMMUTATIVE KU-ALGEBRA
...Show More Authors

In This paper, we introduce the associated graphs of commutative KU-algebra. Firstly, we define the KU-graph which is determined by all the elements of commutative KU-algebra as vertices. Secondly, the graph of equivalence classes of commutative KU-algebra is studied and several examples are presented. Also, by using the definition of graph folding, we prove that the graph of equivalence classes and the graph folding of commutative KU-algebra are the same, where the graph is complete bipartite graph.

Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Cubic ideals of semigroup in KU-algebra
...Show More Authors
Abstract<p>In this work, we study of the concept of a cubic set of a semigroup in KU-algebra. Firstly, we study a cubic sub KU-semigroup and achieve some results in this notion. And then, we get a relation between a cubic sub KU-semi group and a level set of a cubic set. Moreover, we define some cubic ideals of this structure and we found relationships between these ideals.</p><p>2010 AMS Classification. 08A72, 03G25, 06F35</p>
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Nov 11 2015
Journal Name
Thesis
St-Closed and Semi-extending Modules
...Show More Authors

Let R be a commutative ring with identity 1 ¹ 0, and let M be a unitary left module over R. A submodule N of an R-module M is called essential, if whenever N ⋂ L = (0), then L = (0) for every submodule L of M. In this case, we write N ≤e M. An R-module M is called extending, if every submodule of M is an essential in a direct summand of M. A submodule N of an R-module M is called semi-essential (denoted by N ≤sem M), if N ∩ P ≠ (0) for each nonzero prime submodule P of M. The main purpose of this work is to determine and study two new concepts (up to our knowledge) which are St-closed submodules and semi-extending modules. St-closed submodules is contained properly in the class of closed submodules, where a submodule N of

... Show More
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
T-Small Quasi-Dedekind modules
...Show More Authors
Abstract<p>Let Q be a left Module over a ring with identity ℝ. In this paper, we introduced the concept of T-small Quasi-Dedekind Modules as follows, An R-module Q is T-small quasi-Dedekind Module if, <inline-formula> <tex-math><?CDATA $\forall \,w\,\in En{d}_{R}(Q),\,w\ne 0$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" overflow="scroll"> <mrow> <mo>∀</mo> <mspace width="0.25em"></mspace> <mi>w</mi> <mspace width="0.25em"></mspace> <mo></mo></mrow></math></inline-formula></p> ... Show More
View Publication
Scopus Crossref