Proceeding of 3rd International Conference of Mathematics and its Applications最新文献

筛选
英文 中文
ω_p-Open and ω_p-Closed Functions ω_p-Open和ω_p-Closed函数
Halgurd Darwesh, Shagull Mahmood
{"title":"ω_p-Open and ω_p-Closed Functions","authors":"Halgurd Darwesh, Shagull Mahmood","doi":"10.31972/ticma22.12","DOIUrl":"https://doi.org/10.31972/ticma22.12","url":null,"abstract":"In this 𝑤𝑜𝑟𝑘, we study and define two new concepts of functions named ω_p–οpen and ω_p–ϲlosed functions by using the concepts of ω_p-οpen and ω_p-ϲ𝑙𝑜𝑠𝑒𝑑 sets. The concept of ω_p-οpen function strictly located between both the concepts of οpen and preοpen functions. We obtain a few properties of these functions, however, the connections between them are examined.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Applications of Coding Theory in The Projective Space of Order Three 编码理论在三阶射影空间中的新应用
Hajir Abdullah, N. Yahya
{"title":"New Applications of Coding Theory in The Projective Space of Order Three","authors":"Hajir Abdullah, N. Yahya","doi":"10.31972/ticma22.14","DOIUrl":"https://doi.org/10.31972/ticma22.14","url":null,"abstract":"The main aim of this paper is to introduce the relationship between the topic of coding theory and the projective space in field three and test the code. The maximum value of size of code over finite field of order three and an incidence matrix with the parameters, n (length of code), d (minimum distance of code) and e (error-correcting of code) have been constructed. With a theorem and a result that test the code if it is perfect or not.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Transformation Technique to Solve Multi-Objective Linear Programming Problems 求解多目标线性规划问题的一种新的变换技术
Zhian Mahmood, N. Sulaiman
{"title":"A New Transformation Technique to Solve Multi-Objective Linear Programming Problems","authors":"Zhian Mahmood, N. Sulaiman","doi":"10.31972/ticma22.15","DOIUrl":"https://doi.org/10.31972/ticma22.15","url":null,"abstract":"In this paper Standard Error of Mean (SEM), as a new technique, is used for transforming multi-objective linear programming problems (MOLPPs) to the single objective linear programming problems (SOLPPs). To this end, an algorithm has been proposed and suggested to solve MOLPPs, which have been tested through numerical examples by employing Excel Solver. However, the study compares the results of other techniques like (Chandra Sen, Optimal Average of Minimax and Maximin, New Arithmetic Average, New Geometric Average, New Harmonic Average, and Advanced Transformation) with the results of this new technique SEM. The numerical results indicate that a new technique in general is promising.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Image Steganography by Utilizing DNA Properties 利用DNA属性的安全图像隐写
Yaseen Ismael
{"title":"Secure Image Steganography by Utilizing DNA Properties","authors":"Yaseen Ismael","doi":"10.31972/ticma22.08","DOIUrl":"https://doi.org/10.31972/ticma22.08","url":null,"abstract":"In the last period, Steganography is commonly used as an alternative to encryption to achieve secret communication between parties. Many methods have emerged to achieve steganography, including the use of spatial domain, spread spectrum, transform domain, and etc. On the other hand, the methods of attackers have also developed in revealing hidden data and trying to retrieve it. To increase the security of the hiding process, some researchers have found hybrid methods that combine encryption and steganography processes. The research aims to present a new method in steganography by taking advantage of the properties of DNA, which includes the random sequence of nitrogenous bases (A, C, G, T), the process of hybridization, which occurs between two single strands of DNA to form a double strand of DNA so that the bases in the first strand are complementary to the nitrogenous bases in the second strand. The research includes the following steps: First, the secret image to be hidden is encrypted by encoding it into a series of nitrogenous bases, and then the XOR process is performed with a nitrogenous bases sequence for a DNA tape agreed upon between the sender and recipient, the hybridization process applied before and after the XOR process. The results show that encrypted image is much different from the original image and thus they added another level of security to the hidden image. Secondly, the encrypted image resulting from the first step is hidden in the cover image and using a new method based on the use of the agreed-upon DNA tape as a key.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integer-valued polynomials and binomially Noetherian rings 整值多项式与二项诺瑟环
Shadman R. Kareem
{"title":"Integer-valued polynomials and binomially Noetherian rings","authors":"Shadman R. Kareem","doi":"10.31972/ticma22.07","DOIUrl":"https://doi.org/10.31972/ticma22.07","url":null,"abstract":"A torsion free as a Z- module ring R with unit is said to be a binomial ring if it is preserved as binomial symbol (a¦i)≔(a(a-1)(a-2)…(a-(i-1)))/i!, for each a∈R and i ≥ 0. The polynomial ring of integer-valued in rational polynomial Q[X] is defined by Int (Z^X):={h∈Q[X]:h(Z^X)⊂Z} an important example for binomial ring and is non-Noetherian ring. In this paper the algebraic structure of binomial rings has been studied by their properties of binomial ideals. The notion of binomial ideal generated by a given set has been defined. Which allows us to define new class of Noetherian ring using binomial ideals, which we named it binomially Noetherian ring. One of main result the ring Int (Z^({x,y})) over variables x and y present as an example of that kind of class of Noetherian. In general the ring Int(Z^X) over the finite set of variables X and for a particular F subset in Z the rings Int(F^(〖{x〗_1,x_2,...,x_i} ),Z)={h∈Q[x_1,x_2,...,x_i ]:h(F^(〖{x〗_1,x_2,...,x_i} ))⊆ Z} both are presented as examples of that kind of class of Noetherian.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistics department- College of Administration and Economics - Salahaddin University - Erbil 统计系-行政与经济学院-萨拉赫丁大学-埃尔比勒
A. Jafir, Hallo M. Abdullah, A. Ahmed
{"title":"Statistics department- College of Administration and Economics - Salahaddin University - Erbil","authors":"A. Jafir, Hallo M. Abdullah, A. Ahmed","doi":"10.31972/ticma22.06","DOIUrl":"https://doi.org/10.31972/ticma22.06","url":null,"abstract":"Eighteen local and imported salt samples were collected in markets of Kurdistan region. The cooking salt as an essential foodstuff element in meals of population in all over the world has been examined for radioactivity assessment. Gamma ray spectroscopy of NaI (Tl) was used to obtain the spectra and measuring the specific radionuclide activities of 226Ra, 232Th and 40K in salt samples. The related radiological indices of radium equivalent (Raeq), indoor absorbed dose, indoor annual effective dose equivalent (Ein), the internal index (Hin), annual committed effective dose (Eing) and excess life time cancer (ELCR) were calculated which were below the world safety recommendation values declared by UNSCEAR2000 and WHO. Statistics of Pearson correlation were applied to the obtained data to establish the correlation between primordial radionuclide’s and radiological hazards.","PeriodicalId":269628,"journal":{"name":"Proceeding of 3rd International Conference of Mathematics and its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116993461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信