首页 > 最新文献

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

英文 中文
Recursive approach for multiple step-ahead software fault prediction through long short-term memory (LSTM) 基于LSTM的多步超前软件故障预测递归方法
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133251
Md. Rashedul Islam, M. Begum, Md. Nasim Akhtar
Abstract The advancement of technologies demands a sustainable solution. To ensure the software system’s sustainability, diminishing the software faults before the implementation requires utmost attention, along with an effective procedure to predict the faults. A software system’s maximum number of faults can be neutralized if it can be predicted at the earliest possible time. Therefore, we applied Long short-term memory (LSTM) to predict the faults of multi-time stamps ahead using a recursive approach. The Min-Max scaler and one of the power transformation methods, Box-Cox are used to normalize the software fault data. The traditional software reliability growth models (SRGMs) are also used to predict faults. The performance of the LSTM and SRGMs models are compared based on their prediction accuracy evaluation. The observed prediction error of LSTM models is much lower than the SRGMs.
摘要技术的进步需要一个可持续的解决方案。为了确保软件系统的可持续性,在实施之前减少软件故障需要极大的关注,并制定有效的故障预测程序。如果能够在尽可能早的时间预测软件系统的最大故障数量,那么它就可以被消除。因此,我们应用长短期记忆(LSTM)来预测多时间戳的故障,并使用递归方法。最小-最大缩放器和功率变换方法之一Box-Cox用于对软件故障数据进行归一化。传统的软件可靠性增长模型(SRGM)也用于预测故障。基于LSTM和SRGMs模型的预测精度评估,对它们的性能进行了比较。LSTM模型的观测预测误差远低于SRGM。
{"title":"Recursive approach for multiple step-ahead software fault prediction through long short-term memory (LSTM)","authors":"Md. Rashedul Islam, M. Begum, Md. Nasim Akhtar","doi":"10.1080/09720529.2022.2133251","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133251","url":null,"abstract":"Abstract The advancement of technologies demands a sustainable solution. To ensure the software system’s sustainability, diminishing the software faults before the implementation requires utmost attention, along with an effective procedure to predict the faults. A software system’s maximum number of faults can be neutralized if it can be predicted at the earliest possible time. Therefore, we applied Long short-term memory (LSTM) to predict the faults of multi-time stamps ahead using a recursive approach. The Min-Max scaler and one of the power transformation methods, Box-Cox are used to normalize the software fault data. The traditional software reliability growth models (SRGMs) are also used to predict faults. The performance of the LSTM and SRGMs models are compared based on their prediction accuracy evaluation. The observed prediction error of LSTM models is much lower than the SRGMs.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49123172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
V-Net architecture based advanced visually meaningful image encryption technique 基于V-Net架构的先进图像加密技术
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133255
Varsha Himthani, V. Dhaka, Manjit Kaur, Prashant Hemrajani
Abstract The visually meaningful image encryption (VMIE) technique is used to offer additional security to the noise-like encrypted image by implanting the secret image in the cover image. Generally, VMIE techniques follow two steps: pre-encryption and embedding. In this paper, an advanced V-Net architecture based VMIE technique is presented. V-Net architecture is based on a Convolution Neural Network (CNN) and offered medical image segmentation, that is utilized in the image into image steganography in the proposed work. In the proposed VMIE technique, the secret image is encrypted by utilizing the 5D chaotic map to provide high security, and the encrypted secret image is implanted into the cover image using a V-Net based embedding method. CNN-based image embedding methods offer high payload capacity and imperceptibility. In these methods, the encoder hides the secret image into the cover and the decoder reconstruct the secret image. Furthermore, a CNN-based efficient decoder is designed in the proposed method. Moreover, to validate the proposed method, standard evaluation parameters are analyzed.
摘要采用视觉意义图像加密(VMIE)技术,通过在封面图像中植入秘密图像,为类噪声加密图像提供额外的安全性。通常,VMIE技术遵循两个步骤:预加密和嵌入。本文提出了一种基于VMIE技术的先进的V-Net体系结构。V-Net架构基于卷积神经网络(CNN)并提供医学图像分割,在本文的工作中将其用于图像隐写。在VMIE技术中,利用5D混沌映射对秘密图像进行加密以提供较高的安全性,并利用基于V-Net的嵌入方法将加密后的秘密图像植入到封面图像中。基于cnn的图像嵌入方法具有较高的有效载荷能力和隐蔽性。在这些方法中,编码器将秘密图像隐藏到封面中,解码器重建秘密图像。在此基础上,设计了基于cnn的高效解码器。为了验证该方法的有效性,对标准评价参数进行了分析。
{"title":"V-Net architecture based advanced visually meaningful image encryption technique","authors":"Varsha Himthani, V. Dhaka, Manjit Kaur, Prashant Hemrajani","doi":"10.1080/09720529.2022.2133255","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133255","url":null,"abstract":"Abstract The visually meaningful image encryption (VMIE) technique is used to offer additional security to the noise-like encrypted image by implanting the secret image in the cover image. Generally, VMIE techniques follow two steps: pre-encryption and embedding. In this paper, an advanced V-Net architecture based VMIE technique is presented. V-Net architecture is based on a Convolution Neural Network (CNN) and offered medical image segmentation, that is utilized in the image into image steganography in the proposed work. In the proposed VMIE technique, the secret image is encrypted by utilizing the 5D chaotic map to provide high security, and the encrypted secret image is implanted into the cover image using a V-Net based embedding method. CNN-based image embedding methods offer high payload capacity and imperceptibility. In these methods, the encoder hides the secret image into the cover and the decoder reconstruct the secret image. Furthermore, a CNN-based efficient decoder is designed in the proposed method. Moreover, to validate the proposed method, standard evaluation parameters are analyzed.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48794236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MORID: MQTT oriented routing between IoT devices MORID:物联网设备之间面向MQTT的路由
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2139933
Sonam, R. Johari
Abstract Routing is a key to exchange of the messages between the IoT enabled devices. For routing to be effective and efficient the message needs to be delivered instantly between neighboring nodes in IoT enabled network, if they are co-located in the overlapping transmission range of each other or through the cloud if the devices are located remotely. In today’s scenario, optimized routing is the need of the hour. In the proposed research work, an effort has been made to demonstrate the effective routing between publisher and subscriber through a centralized broker using IoT routing protocol such as MQTT (Message Queue Telemetry Transport). The Simulation of the protocol has been accomplished in JAVA Programming language using MOSQUITTO open-source toolkit and the results have been positive and encouraging.
路由是物联网设备之间交换消息的关键。为了使路由有效和高效,在支持物联网的网络中,如果相邻节点位于彼此重叠的传输范围内,或者如果设备位于远程位置,则需要通过云在相邻节点之间即时传递消息。在今天的场景中,优化的路由是当务之急。在提议的研究工作中,已经努力通过使用物联网路由协议(如MQTT(消息队列遥测传输))的集中式代理来演示发布者和订阅者之间的有效路由。利用蚊蝇开源工具包,用JAVA编程语言对该协议进行了仿真,取得了良好的效果。
{"title":"MORID: MQTT oriented routing between IoT devices","authors":"Sonam, R. Johari","doi":"10.1080/09720529.2022.2139933","DOIUrl":"https://doi.org/10.1080/09720529.2022.2139933","url":null,"abstract":"Abstract Routing is a key to exchange of the messages between the IoT enabled devices. For routing to be effective and efficient the message needs to be delivered instantly between neighboring nodes in IoT enabled network, if they are co-located in the overlapping transmission range of each other or through the cloud if the devices are located remotely. In today’s scenario, optimized routing is the need of the hour. In the proposed research work, an effort has been made to demonstrate the effective routing between publisher and subscriber through a centralized broker using IoT routing protocol such as MQTT (Message Queue Telemetry Transport). The Simulation of the protocol has been accomplished in JAVA Programming language using MOSQUITTO open-source toolkit and the results have been positive and encouraging.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43579960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy ideals and fuzzy congruences of distributive demi-p-algebras 分配半-p代数的模糊理想与模糊同余
IF 1.4 Q1 Mathematics Pub Date : 2022-09-25 DOI: 10.1080/09720529.2021.2012889
Teferi Getachew Alemayehu, Zebider Ayenew Ageze
{"title":"Fuzzy ideals and fuzzy congruences of distributive demi-p-algebras","authors":"Teferi Getachew Alemayehu, Zebider Ayenew Ageze","doi":"10.1080/09720529.2021.2012889","DOIUrl":"https://doi.org/10.1080/09720529.2021.2012889","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59648047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A signature algorithm based on chaotic maps and factoring problems 一种基于混沌映射和分解问题的签名算法
IF 1.4 Q1 Mathematics Pub Date : 2022-09-12 DOI: 10.1080/09720529.2022.2101601
N. Tahat, M. Shatnawi, S. Shatnawi, O. Ababneh, Obaida M. Al-hazaimeh
Abstract There has been a great deal of interest in researching the behavior of chaotic systems over the past decade. They are distinguished by their sensitivity to initial conditions, continuous broad-band power spectrum, and similarity to random behavior. Chaos has possible applications in the encryption, compression, and modulation blocks of a digital communication system. The possibility of self-synchronization of chaotic oscillations has spawned a deluge of research on the cryptographic applications of chaos. FAC (Factoring) and CM (Chaotic maps) are used in this research to develop a new signature system (CM). Our system has a higher security level than any other based on a single hard number-theoretic problem since it is extremely unlikely that FAC and CM can be solved effectively at the same time. We further demonstrate that the scheme’s performance involves only minimal operations in signing and validating logarithms, and that it is impervious to attack.
摘要在过去的十年里,人们对混沌系统的行为进行了大量的研究。它们的区别在于对初始条件的敏感性、连续的宽带功率谱以及对随机行为的相似性。混沌在数字通信系统的加密、压缩和调制块中有可能应用。混沌振荡自同步的可能性引发了对混沌密码应用的大量研究。本研究利用FAC(Factoring)和CM(混沌映射)来开发一种新的签名系统。我们的系统比任何其他基于单个硬数论问题的系统都具有更高的安全级别,因为FAC和CM不太可能同时有效解决。我们进一步证明,该方案的性能只涉及签名和验证对数的最小操作,并且不受攻击。
{"title":"A signature algorithm based on chaotic maps and factoring problems","authors":"N. Tahat, M. Shatnawi, S. Shatnawi, O. Ababneh, Obaida M. Al-hazaimeh","doi":"10.1080/09720529.2022.2101601","DOIUrl":"https://doi.org/10.1080/09720529.2022.2101601","url":null,"abstract":"Abstract There has been a great deal of interest in researching the behavior of chaotic systems over the past decade. They are distinguished by their sensitivity to initial conditions, continuous broad-band power spectrum, and similarity to random behavior. Chaos has possible applications in the encryption, compression, and modulation blocks of a digital communication system. The possibility of self-synchronization of chaotic oscillations has spawned a deluge of research on the cryptographic applications of chaos. FAC (Factoring) and CM (Chaotic maps) are used in this research to develop a new signature system (CM). Our system has a higher security level than any other based on a single hard number-theoretic problem since it is extremely unlikely that FAC and CM can be solved effectively at the same time. We further demonstrate that the scheme’s performance involves only minimal operations in signing and validating logarithms, and that it is impervious to attack.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48316621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the eigenvalues of closed shadow graphs 关于闭影图的特征值
IF 1.4 Q1 Mathematics Pub Date : 2022-08-18 DOI: 10.1080/09720529.2022.2060609
F. J. Campena, Melody Mae C. Lunar, Inseok Sung
Abstract The energy and d-energy of a graph is the sum of the absolute values of the graphs’ adjacency and distance matrix respectively. In 2017, S. Vaidya and K. Popat determined the energy of a shadow graph of a connected graph. In this study we determine the eigenvalues and d-eigenvalues of a closed shadow graph. Thus, determining also the energy and distance energy of a closed shadow graph. As a consequence, the closed shadow graph of G is integral whenever G is integral, that is the eigenvalues of the adjacency matrix of the graph are all integers.
图的能量和d能量分别是图的邻接矩阵和距离矩阵的绝对值之和。2017年,S. Vaidya和K. Popat确定了连通图的阴影图的能量。本研究确定了闭影图的特征值和d特征值。由此,也确定了闭合阴影图的能量和距离能量。因此,当G为整数时,G的闭影图为整数,即图邻接矩阵的特征值均为整数。
{"title":"On the eigenvalues of closed shadow graphs","authors":"F. J. Campena, Melody Mae C. Lunar, Inseok Sung","doi":"10.1080/09720529.2022.2060609","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060609","url":null,"abstract":"Abstract The energy and d-energy of a graph is the sum of the absolute values of the graphs’ adjacency and distance matrix respectively. In 2017, S. Vaidya and K. Popat determined the energy of a shadow graph of a connected graph. In this study we determine the eigenvalues and d-eigenvalues of a closed shadow graph. Thus, determining also the energy and distance energy of a closed shadow graph. As a consequence, the closed shadow graph of G is integral whenever G is integral, that is the eigenvalues of the adjacency matrix of the graph are all integers.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44944433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Notes on elementary proof of Graham conjecture 关于格雷厄姆猜想初等证明的注解
IF 1.4 Q1 Mathematics Pub Date : 2022-08-18 DOI: 10.1080/09720529.2021.1995221
Wei Ren
Abstract We prove Graham conjecture for some cases only by elementary methods in basic number theory. Extensive notes and remarks on new results on searching for the elementary proof of Graham conjecture are presented and discussed, e.g., by induction or directed graph.
摘要我们仅用基本数论中的初等方法在某些情况下证明了Graham猜想。对寻找Graham猜想初等证明的新结果,例如用归纳法或有向图法,给出了广泛的注记和注记。
{"title":"Notes on elementary proof of Graham conjecture","authors":"Wei Ren","doi":"10.1080/09720529.2021.1995221","DOIUrl":"https://doi.org/10.1080/09720529.2021.1995221","url":null,"abstract":"Abstract We prove Graham conjecture for some cases only by elementary methods in basic number theory. Extensive notes and remarks on new results on searching for the elementary proof of Graham conjecture are presented and discussed, e.g., by induction or directed graph.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41309093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of RSA with smooth prime sum 光滑素数和RSA的密码分析
IF 1.4 Q1 Mathematics Pub Date : 2022-08-18 DOI: 10.1080/09720529.2021.2000152
Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, M. Belkasmi
{"title":"Cryptanalysis of RSA with smooth prime sum","authors":"Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, M. Belkasmi","doi":"10.1080/09720529.2021.2000152","DOIUrl":"https://doi.org/10.1080/09720529.2021.2000152","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46127888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Q-smarandache pseudo clean ideals of BH-Algebra h -代数的一个Q-smarandache伪干净理想
IF 1.4 Q1 Mathematics Pub Date : 2022-08-18 DOI: 10.1080/09720529.2022.2099060
A. Jabbar, A. H. Hussain
Abstract In this paper, we studied some of the properties of a Q-Samarandache pseudo BH- algebra, a Q-Samarandache pseudo ideal, a pseudo clean ideal and a Q-Samarandache pseudo clean ideal of a Q-Samarandache pseudo BH-algebra respectively and so we presented the relationships between these types of ideals.
摘要本文分别研究了Q-Samarandache伪BH-代数、Q-Samarandache伪理想、Q-Samarandache伪理想和Q-Samarandache伪BH-代数的一些性质,并给出了这些理想类型之间的关系。
{"title":"A Q-smarandache pseudo clean ideals of BH-Algebra","authors":"A. Jabbar, A. H. Hussain","doi":"10.1080/09720529.2022.2099060","DOIUrl":"https://doi.org/10.1080/09720529.2022.2099060","url":null,"abstract":"Abstract In this paper, we studied some of the properties of a Q-Samarandache pseudo BH- algebra, a Q-Samarandache pseudo ideal, a pseudo clean ideal and a Q-Samarandache pseudo clean ideal of a Q-Samarandache pseudo BH-algebra respectively and so we presented the relationships between these types of ideals.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59648250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nearly prime GR-submodules of GR-modules GR模的近素数GR子模
IF 1.4 Q1 Mathematics Pub Date : 2022-08-18 DOI: 10.1080/09720529.2022.2060918
Hasan Abdulraheem Jubair Al-Yasiri, Ali Abd Alhussein Zyarah, Adnan Waseel Kadhim Shubbar
Abstract A gamma ring(Γ− ring) is ΓR-module and W is proper ΓR-submodule. Let W be a proper ΓR-submodule of an ΓR-module is called nearly prime, for short N-P.ΓR-submodule if whenever and rγ m ∈ W implies that either or where is the Jacobson radical of . The goal of this work is to offer an intriguing way of defining and studying nearly P.ΓR-submodule of ΓR-module, for short N-P.ΓR-submodule of ΓR-module result N-P.ΓR-submodule of ΓR-module which represent generalization N-prime submodules.
Γ-环是ΓR-模,W是适当的ΓR-子模。设W是ΓR-模的适当ΓR-子模称为近素数,简称N-P。ΓR-个子模如果当且Rγm∈W意味着其中之一或其中之一是的Jacobson根。这项工作的目的是提供一种有趣的方法来定义和研究ΓR-模的几乎PΓR-子模,简称ΓR-模块的N-PΓR子模结果ΓR-模型的N-P。
{"title":"Nearly prime GR-submodules of GR-modules","authors":"Hasan Abdulraheem Jubair Al-Yasiri, Ali Abd Alhussein Zyarah, Adnan Waseel Kadhim Shubbar","doi":"10.1080/09720529.2022.2060918","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060918","url":null,"abstract":"Abstract A gamma ring(Γ− ring) is ΓR-module and W is proper ΓR-submodule. Let W be a proper ΓR-submodule of an ΓR-module is called nearly prime, for short N-P.ΓR-submodule if whenever and rγ m ∈ W implies that either or where is the Jacobson radical of . The goal of this work is to offer an intriguing way of defining and studying nearly P.ΓR-submodule of ΓR-module, for short N-P.ΓR-submodule of ΓR-module result N-P.ΓR-submodule of ΓR-module which represent generalization N-prime submodules.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41687763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1