In this 𝑤𝑜𝑟𝑘, we study and define two new concepts of functions named ω_p–οpen and ω_p–ϲlosed functions by using the concepts of ω_p-οpen and ω_p-ϲ𝑙𝑜𝑠𝑒𝑑 sets. The concept of ω_p-οpen function strictly located between both the concepts of οpen and preοpen functions. We obtain a few properties of these functions, however, the connections between them are examined.
{"title":"ω_p-Open and ω_p-Closed Functions","authors":"Halgurd Darwesh, Shagull Mahmood","doi":"10.31972/ticma22.12","DOIUrl":"https://doi.org/10.31972/ticma22.12","url":null,"abstract":"In this 𝑤𝑜𝑟𝑘, we study and define two new concepts of functions named ω_p–οpen and ω_p–ϲlosed functions by using the concepts of ω_p-οpen and ω_p-ϲ𝑙𝑜𝑠𝑒𝑑 sets. The concept of ω_p-οpen function strictly located between both the concepts of οpen and preοpen functions. We obtain a few properties of these functions, however, the connections between them are examined.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main aim of this paper is to introduce the relationship between the topic of coding theory and the projective space in field three and test the code. The maximum value of size of code over finite field of order three and an incidence matrix with the parameters, n (length of code), d (minimum distance of code) and e (error-correcting of code) have been constructed. With a theorem and a result that test the code if it is perfect or not.
{"title":"New Applications of Coding Theory in The Projective Space of Order Three","authors":"Hajir Abdullah, N. Yahya","doi":"10.31972/ticma22.14","DOIUrl":"https://doi.org/10.31972/ticma22.14","url":null,"abstract":"The main aim of this paper is to introduce the relationship between the topic of coding theory and the projective space in field three and test the code. The maximum value of size of code over finite field of order three and an incidence matrix with the parameters, n (length of code), d (minimum distance of code) and e (error-correcting of code) have been constructed. With a theorem and a result that test the code if it is perfect or not.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper Standard Error of Mean (SEM), as a new technique, is used for transforming multi-objective linear programming problems (MOLPPs) to the single objective linear programming problems (SOLPPs). To this end, an algorithm has been proposed and suggested to solve MOLPPs, which have been tested through numerical examples by employing Excel Solver. However, the study compares the results of other techniques like (Chandra Sen, Optimal Average of Minimax and Maximin, New Arithmetic Average, New Geometric Average, New Harmonic Average, and Advanced Transformation) with the results of this new technique SEM. The numerical results indicate that a new technique in general is promising.
本文将均值标准误差(SEM)作为一种新技术,用于将多目标线性规划问题转化为单目标线性规划问题。为此,本文提出并建议了一种求解molpp的算法,并利用Excel求解器进行了数值算例验证。然而,该研究将其他技术的结果(如Chandra Sen, Minimax和Maximin的最优平均,新算术平均,新几何平均,新谐波平均和高级变换)与这种新技术SEM的结果进行了比较。数值结果表明,这是一种很有前途的新技术。
{"title":"A New Transformation Technique to Solve Multi-Objective Linear Programming Problems","authors":"Zhian Mahmood, N. Sulaiman","doi":"10.31972/ticma22.15","DOIUrl":"https://doi.org/10.31972/ticma22.15","url":null,"abstract":"In this paper Standard Error of Mean (SEM), as a new technique, is used for transforming multi-objective linear programming problems (MOLPPs) to the single objective linear programming problems (SOLPPs). To this end, an algorithm has been proposed and suggested to solve MOLPPs, which have been tested through numerical examples by employing Excel Solver. However, the study compares the results of other techniques like (Chandra Sen, Optimal Average of Minimax and Maximin, New Arithmetic Average, New Geometric Average, New Harmonic Average, and Advanced Transformation) with the results of this new technique SEM. The numerical results indicate that a new technique in general is promising.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the last period, Steganography is commonly used as an alternative to encryption to achieve secret communication between parties. Many methods have emerged to achieve steganography, including the use of spatial domain, spread spectrum, transform domain, and etc. On the other hand, the methods of attackers have also developed in revealing hidden data and trying to retrieve it. To increase the security of the hiding process, some researchers have found hybrid methods that combine encryption and steganography processes. The research aims to present a new method in steganography by taking advantage of the properties of DNA, which includes the random sequence of nitrogenous bases (A, C, G, T), the process of hybridization, which occurs between two single strands of DNA to form a double strand of DNA so that the bases in the first strand are complementary to the nitrogenous bases in the second strand. The research includes the following steps: First, the secret image to be hidden is encrypted by encoding it into a series of nitrogenous bases, and then the XOR process is performed with a nitrogenous bases sequence for a DNA tape agreed upon between the sender and recipient, the hybridization process applied before and after the XOR process. The results show that encrypted image is much different from the original image and thus they added another level of security to the hidden image. Secondly, the encrypted image resulting from the first step is hidden in the cover image and using a new method based on the use of the agreed-upon DNA tape as a key.
{"title":"Secure Image Steganography by Utilizing DNA Properties","authors":"Yaseen Ismael","doi":"10.31972/ticma22.08","DOIUrl":"https://doi.org/10.31972/ticma22.08","url":null,"abstract":"In the last period, Steganography is commonly used as an alternative to encryption to achieve secret communication between parties. Many methods have emerged to achieve steganography, including the use of spatial domain, spread spectrum, transform domain, and etc. On the other hand, the methods of attackers have also developed in revealing hidden data and trying to retrieve it. To increase the security of the hiding process, some researchers have found hybrid methods that combine encryption and steganography processes. The research aims to present a new method in steganography by taking advantage of the properties of DNA, which includes the random sequence of nitrogenous bases (A, C, G, T), the process of hybridization, which occurs between two single strands of DNA to form a double strand of DNA so that the bases in the first strand are complementary to the nitrogenous bases in the second strand. The research includes the following steps: First, the secret image to be hidden is encrypted by encoding it into a series of nitrogenous bases, and then the XOR process is performed with a nitrogenous bases sequence for a DNA tape agreed upon between the sender and recipient, the hybridization process applied before and after the XOR process. The results show that encrypted image is much different from the original image and thus they added another level of security to the hidden image. Secondly, the encrypted image resulting from the first step is hidden in the cover image and using a new method based on the use of the agreed-upon DNA tape as a key.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A torsion free as a Z- module ring R with unit is said to be a binomial ring if it is preserved as binomial symbol (a¦i)≔(a(a-1)(a-2)…(a-(i-1)))/i!, for each a∈R and i ≥ 0. The polynomial ring of integer-valued in rational polynomial Q[X] is defined by Int (Z^X):={h∈Q[X]:h(Z^X)⊂Z} an important example for binomial ring and is non-Noetherian ring. In this paper the algebraic structure of binomial rings has been studied by their properties of binomial ideals. The notion of binomial ideal generated by a given set has been defined. Which allows us to define new class of Noetherian ring using binomial ideals, which we named it binomially Noetherian ring. One of main result the ring Int (Z^({x,y})) over variables x and y present as an example of that kind of class of Noetherian. In general the ring Int(Z^X) over the finite set of variables X and for a particular F subset in Z the rings Int(F^(〖{x〗_1,x_2,...,x_i} ),Z)={h∈Q[x_1,x_2,...,x_i ]:h(F^(〖{x〗_1,x_2,...,x_i} ))⊆ Z} both are presented as examples of that kind of class of Noetherian.
{"title":"Integer-valued polynomials and binomially Noetherian rings","authors":"Shadman R. Kareem","doi":"10.31972/ticma22.07","DOIUrl":"https://doi.org/10.31972/ticma22.07","url":null,"abstract":"A torsion free as a Z- module ring R with unit is said to be a binomial ring if it is preserved as binomial symbol (a¦i)≔(a(a-1)(a-2)…(a-(i-1)))/i!, for each a∈R and i ≥ 0. The polynomial ring of integer-valued in rational polynomial Q[X] is defined by Int (Z^X):={h∈Q[X]:h(Z^X)⊂Z} an important example for binomial ring and is non-Noetherian ring. In this paper the algebraic structure of binomial rings has been studied by their properties of binomial ideals. The notion of binomial ideal generated by a given set has been defined. Which allows us to define new class of Noetherian ring using binomial ideals, which we named it binomially Noetherian ring. One of main result the ring Int (Z^({x,y})) over variables x and y present as an example of that kind of class of Noetherian. In general the ring Int(Z^X) over the finite set of variables X and for a particular F subset in Z the rings Int(F^(〖{x〗_1,x_2,...,x_i} ),Z)={h∈Q[x_1,x_2,...,x_i ]:h(F^(〖{x〗_1,x_2,...,x_i} ))⊆ Z} both are presented as examples of that kind of class of Noetherian.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eighteen local and imported salt samples were collected in markets of Kurdistan region. The cooking salt as an essential foodstuff element in meals of population in all over the world has been examined for radioactivity assessment. Gamma ray spectroscopy of NaI (Tl) was used to obtain the spectra and measuring the specific radionuclide activities of 226Ra, 232Th and 40K in salt samples. The related radiological indices of radium equivalent (Raeq), indoor absorbed dose, indoor annual effective dose equivalent (Ein), the internal index (Hin), annual committed effective dose (Eing) and excess life time cancer (ELCR) were calculated which were below the world safety recommendation values declared by UNSCEAR2000 and WHO. Statistics of Pearson correlation were applied to the obtained data to establish the correlation between primordial radionuclide’s and radiological hazards.
{"title":"Statistics department- College of Administration and Economics - Salahaddin University - Erbil","authors":"A. Jafir, Hallo M. Abdullah, A. Ahmed","doi":"10.31972/ticma22.06","DOIUrl":"https://doi.org/10.31972/ticma22.06","url":null,"abstract":"Eighteen local and imported salt samples were collected in markets of Kurdistan region. The cooking salt as an essential foodstuff element in meals of population in all over the world has been examined for radioactivity assessment. Gamma ray spectroscopy of NaI (Tl) was used to obtain the spectra and measuring the specific radionuclide activities of 226Ra, 232Th and 40K in salt samples. The related radiological indices of radium equivalent (Raeq), indoor absorbed dose, indoor annual effective dose equivalent (Ein), the internal index (Hin), annual committed effective dose (Eing) and excess life time cancer (ELCR) were calculated which were below the world safety recommendation values declared by UNSCEAR2000 and WHO. Statistics of Pearson correlation were applied to the obtained data to establish the correlation between primordial radionuclide’s and radiological hazards.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116993461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}