In this paper, we apply the notion of a bipolar fuzzy n-fold KU-ideal of KU- algebras. We introduce the concept of a bipolar fuzzy n-fold KU-ideal and investigate several properties. Also, we give relations between a bipolar fuzzy n- fold KU-ideal and n-fold KU-ideal. The image and the pre-image of bipolar fuzzy n-fold KU-ideals in KU-algebras are defined and how the image and the pre- image of bipolar fuzzy n-fold KU-ideals in KU-algebras become bipolar fuzzy n- fold KU-ideals are studied. Moreover, the product of bipolar fuzzy n-fold KU- ideals in Cartesian product KU-algebras is given.
Abstract. In this study, we shall research the fibrewise micro ideal topological spaces over Ḃ, as well as the relationship between fibrewise micro ideal topological spaces over Ḃ and fibrewise micro topological spaces over Ḃ. At first present introduces a novel notion from fibrewise micro ideal topological spaces over Ḃ, and differentiates it from fibrewise micro topological spaces over Ḃ. Some fundamental characteristics from these spaces are studied. Then show discussed the fibrewise micro ideal closed and micro ideal open topologies. Many propositions relating to these ideas are offered. In the next part will study defines and investigates novel conceptions from fibrewise micro ideal topological spaces over Ḃ, particularly f
... Show MoreIn this work we explain and discuss new notion of fibrewise topological spaces, calledfibrewise soft ideal topological spaces, Also, we show the notions of fibrewise closed soft ideal topological spaces, fibrewise open soft ideal topological spaces and fibrewise soft near ideal topological spaces.
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
This paper aims to introduce certain new kinds of ideals on pseudo-BG-Algebra (P-BG-A), such as pseudo-closed ideal (P-CI), pseudo-completely closed ideal (P-CCI), and pseudo-n-ideal (P-n-I). Firstly, a (P-n-I) is defined and its pertinent properties are explored. Some important properties have been proven, for example, any pseudo-ideal is a (P-n-I), but the opposite is not generally true, an example was given of the opposite direction. Also, every pseudo-subalgebra of a (P-BG-A) is a pseudo ideal and it is a (P-n-I). Secondly, (P-CI) and a (P-CCI) ideal are defined. After that, we prove that every pseudo-subalgebra of a (P-BG-A) is a (P-CI) and the converse is true. The relationship between (P-BG-A) and pseudo-BH-algebra is demonstrated un
... Show MoreIn this paper is to introduce the concept of hyper AT-algebras is a generalization of AT-algebras and study a hyper structure AT-algebra and investigate some of its properties. “Also, hyper AT-subalgebras and hyper AT-ideal of hyper AT-algebras are studied. We study on the fuzzy theory of hyper AT-ideal of hyper AT-algebras hyper AT-algebra”. “We study homomorphism of hyper AT-algebras which are a common generalization of AT-algebras.
The study of cohomology groups is one of the most intensive and exciting researches that arises from algebraic topology. Particularly, the dimension of cohomology groups is a highly useful invariant which plays a rigorous role in the geometric classification of associative algebras. This work focuses on the applications of low dimensional cohomology groups. In this regards, the cohomology groups of degree zero and degree one of nilpotent associative algebras in dimension four are described in matrix form.
In this paper we generalize some of the results due to Bell and Mason on a near-ring N admitting a derivation D , and we will show that the body of evidence on prime near-rings with derivations have the behavior of the ring. Our purpose in this work is to explore further this ring like behavior. Also, we show that under appropriate additional hypothesis a near-ring must be a commutative ring.
This research was from an introduction, three topics and a conclusion, as follows:
The first topic: the concept of Islamic banks and their emergence and development, which includes three demands are:
The first requirement: the concept of Islamic banks and types, and there are two requirements:
* Definition of Islamic banks language and idiom.
* Types of Islamic banks.
The second requirement: the emergence and development of Islamic banks.
Third requirement: the importance of Islamic banks and their objectives.
We learned about the concept of banks and their origins and how they developed and what are the most important types of Islamic banks
The second topic: Formulas and sources of financing in Islamic banks and