منابع مشابه
Fully fuzzy prime semigroups
The fundamental concept of a fuzzy set, introduced by Zadeh in his classic paper [5] of 1965, has been applied by many authors to generalize some of the basic notions of algebra. In this note we characterize the semigroups for which each fuzzy ideal is prime, also the semigroups for which each fuzzy right ideal is prime. In Section 2, we prove that a semigroup is fully fuzzy prime if and only i...
متن کاملPrime Decompositions of Radicals in Polynomial Rings
In the last twenty years several methods for computing primary decompositions of ideals in multivariate polynomial rings over fields (Seidenberg (1974), Lazard (1985), Kredel (1987), Eisenbud et al. (1992)), the integers (Seidenberg, 1978), factorially closed principal ideal domains (Ayoub (1982), Gianni et al. (1988)) and more general rings (Seidenberg, 1984) have been proposed. A related prob...
متن کاملUnitary Strongly Prime Rings and Related Radicals
A unitary strongly prime ring is defined as a prime ring whose central closure is simple with identity element. The class of unitary strongly prime rings is a special class of rings and the corresponding radical is called the unitary strongly prime radical. In this paper we prove some results on unitary strongly prime rings. The results are applied to study the unitary strongly prime radical of...
متن کاملPrime Radicals of Skew Laurent Polynomial Rings
Let R be a ring with an automorphism σ. An ideal I of R is σ-ideal of R if σ(I) = I. A proper ideal P of R is σ-prime ideal of R if P is a σ-ideal of R and for σ-ideals I and J of R, IJ ⊆ P implies that I ⊆ P or J ⊆ P . A proper ideal Q of R is σ-semiprime ideal of Q if Q is a σ-ideal and for a σ-ideal I of R, I2 ⊆ Q implies that I ⊆ Q. The σ-prime radical is defined by the intersection of all ...
متن کاملTraceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with the ciphertexts are generally role-based and the attributes satisfying the policies are generally shared by multiple users. If a malicious user, with his attributes shared with multiple other users, created a decryption blackbox for sale, this malicious user could be difficult to identify from the blackbox...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Indonesian Mathematical Society
سال: 2017
ISSN: 2460-0245,2086-8952
DOI: 10.22342/jims.23.2.302.33-45