Preferred Language
Articles
/
bsj-2447
On Fully Stable Banach Algebra Modules and Fully Pesudo Stable Banach Algebra Modules
...Show More Authors

The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Early Childhood Special Education (int-jecse)
(𝝁∗- Essential Lifting Modules)
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Cofinitely @Dj-supplemented modules
...Show More Authors

Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
J-semi regular modules
...Show More Authors
Abstract<p>Let <italic>R</italic> be a ring with identity and let <italic>M</italic> be a left R-module. <italic>M</italic> is called J-semiregular module if every cyclic submodule of <italic>M</italic> is J-lying over a projective summand of <italic>M</italic>, The aim of this paper is to introduce properties of J-semiregular module Especially, we give characterizations of J-semiregular module. On the other hand, the notion of J-semi hollow modules is studied as a generalization of semi hollow modules, finally <italic>F</italic>-J-semiregular modules is studied as a generalization of <italic>F</italic>-semiregular modules.</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Semi-essentially prime modules
...Show More Authors

Let R be a commutative ring with 1 and M be a (left) unitary R – module. This essay gives generalizations for the notions prime module and some concepts related to it. We termed an R – module M as semi-essentially prime if annR (M) = annR (N) for every non-zero semi-essential submodules N of M. Given some of their advantages characterizations and examples, and we study the relation between these and some classes of modules.

Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 11 2015
Journal Name
Thesis
St-Closed and Semi-extending Modules
...Show More Authors

Let R be a commutative ring with identity 1 ¹ 0, and let M be a unitary left module over R. A submodule N of an R-module M is called essential, if whenever N ⋂ L = (0), then L = (0) for every submodule L of M. In this case, we write N ≤e M. An R-module M is called extending, if every submodule of M is an essential in a direct summand of M. A submodule N of an R-module M is called semi-essential (denoted by N ≤sem M), if N ∩ P ≠ (0) for each nonzero prime submodule P of M. The main purpose of this work is to determine and study two new concepts (up to our knowledge) which are St-closed submodules and semi-extending modules. St-closed submodules is contained properly in the class of closed submodules, where a submodule N of

... Show More
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
H - He-essential-supplemented modules
...Show More Authors

Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
T-Small Quasi-Dedekind modules
...Show More Authors
Abstract<p>Let Q be a left Module over a ring with identity ℝ. In this paper, we introduced the concept of T-small Quasi-Dedekind Modules as follows, An R-module Q is T-small quasi-Dedekind Module if, <inline-formula> <tex-math><?CDATA $\forall \,w\,\in En{d}_{R}(Q),\,w\ne 0$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" overflow="scroll"> <mrow> <mo>∀</mo> <mspace width="0.25em"></mspace> <mi>w</mi> <mspace width="0.25em"></mspace> <mo></mo></mrow></math></inline-formula></p> ... Show More
View Publication
Scopus Crossref