نتایج جستجو برای: generalized fuzzy quotient ring

تعداد نتایج: 385535  

2017
V. V. Bavula

A new class of rings, the class of weakly left localizable rings, is introduced. A ring R is called weakly left localizable if each non-nilpotent element of R is invertible in some left localization SR of the ring R. Explicit criteria are given for a ring to be a weakly left localizable ring provided the ring has only finitely many maximal left denominator sets (eg, this is the case if a ring h...

Journal: :Journal of Mathematical Analysis and Applications 1980

Journal: :International Journal of Mathematics and Mathematical Sciences 2006

The backing of the fuzzy ideal is normal ideal in some ring and in same time there fuzzy set whose is not fuzzy ideal and it backing set is ideal, i.e., it crisp is normal ideal. Consequently, in this paper we constructing a fuzziness function which defined on fuzzy sets and assigns membership grade for every fuzzy set whose it backing set are crisp ideal. Now, Let  be collection of all fuzzy s...

2014
V. V. Bavula

A new class of rings, the class of left localizable rings, is introduced. A ring R is left localizable if each nonzero element of R is invertible in some left localization SR of the ring R. Explicit criteria are given for a ring to be a left localizable ring provided the ring has only finitely many maximal left denominator sets (eg, this is the case if a ring has a left Artinian left quotient r...

Let $(R, m)$ be a commutative noetherian local ring and let $Gamma$ be a finite group. It is proved that if $R$ admits a dualizing module, then the group ring $Rga$ has a dualizing bimodule as well. Moreover, it is shown that a finitely generated $Rga$-module $M$ has generalized Gorenstein dimension zero if and only if it has generalized Gorenstein dimension zero as an $R$-module.

Journal: :IACR Cryptology ePrint Archive 2017
Anna Johnston

This paper describes a radically different privacy, security and integrity solution. Dispersed Cryptography converts the cloud from a security threat into a security asset by combining a standard stream cipher and the Quotient Ring Transform (QRT). The result is an integrated error correction/encryption algorithm. This encoding disperses data, breaking it into many smaller pieces and scattering...

2004
Wung-Hong Huang

We use the Myers T-dual nonabelin Born-Infeld action to find some new nontrivial solutions for the branes in the background of D6-branes and Melvin magnetic tube field. In the D6Branes background we can find both of the fuzzy sphere and fuzzy ring solutions, which are formed by the gravitational dielectric effect. We see that the fuzzy ring solution has less energy then that of the fuzzy sphere...

2006
Li-Quan Zhao Ling Zhang

Quotient space theory (QST), a new granule computing tool dealing with imprecise, incomplete and uncertain knowledge, uses a triplet, including the universe, its structure and attributes, to describe a problem space or simply a space. As one of important theories of granular computing (GrC), QST is very helpful to the study of cognitive informatics (CI). This article summarizes the quotient spa...

In this paper, for a complete lattice L, we introduce interval-valued L-fuzzy ideal (prime ideal) of a near-ring which is an extended notion of fuzzy ideal (prime ideal) of a near-ring. Some characterization and properties are discussed.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید