-
Rings Whose Non-Invertible Elements Are Nil-Clean
Authors:
Peter Danchev,
Arash Javan,
Omid Hasanzadeh,
Ahmad Moussavi
Abstract:
We systematically study those rings whose non-units are a sum of an idempotent and a nilpotent. Some crucial characteristic properties are completely described as well as some structural results for this class of rings are obtained. This work somewhat continues two publications on the subject due to Diesl (J. Algebra, 2013) and Karimi-Mansoub et al. (Contemp. Math., 2018).
We systematically study those rings whose non-units are a sum of an idempotent and a nilpotent. Some crucial characteristic properties are completely described as well as some structural results for this class of rings are obtained. This work somewhat continues two publications on the subject due to Diesl (J. Algebra, 2013) and Karimi-Mansoub et al. (Contemp. Math., 2018).
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Rings whose Non-Invertible Elements are Strongly Nil-Clean
Authors:
Peter Danchev,
Omid Hasanzadeh,
Arash Javan,
Ahmad Moussavi
Abstract:
We consider in-depth and characterize in certain aspects those rings whose non-units are strongly nil-clean in the sense that they are a sum of commuting nilpotent and idempotent. In addition, we examine those rings in which the non-units are uniquely nil-clean in the sense that they are a sum of a nilpotent and an unique idempotent. In fact, we succeeded to prove that these two classes of rings c…
▽ More
We consider in-depth and characterize in certain aspects those rings whose non-units are strongly nil-clean in the sense that they are a sum of commuting nilpotent and idempotent. In addition, we examine those rings in which the non-units are uniquely nil-clean in the sense that they are a sum of a nilpotent and an unique idempotent. In fact, we succeeded to prove that these two classes of rings can completely be characterized in terms of already well-studied and fully described sorts of rings.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Rings with $u-1$ Quasinilpotent for Each Unit $u$
Authors:
Peter Danchev,
Arash Javan,
Omid Hasanzadeh,
Ahmad Moussavi
Abstract:
We define and explore in-depth the notion of {\it UQ rings} by showing their important properties and by comparing their behavior with that of the well-known classes of UU rings and JU rings, respectively. Specifically, among the other established results, we prove that UQ rings are always Dedekind finite (often named directly finite) as well as that, for semipotent rings $R$, the following equiva…
▽ More
We define and explore in-depth the notion of {\it UQ rings} by showing their important properties and by comparing their behavior with that of the well-known classes of UU rings and JU rings, respectively. Specifically, among the other established results, we prove that UQ rings are always Dedekind finite (often named directly finite) as well as that, for semipotent rings $R$, the following equivalence hold: $R/J(R)$ is UQ $\iff$ $R$ is UQ having the property that the set $QN(R)$ of quasinilpotent elements of $R$ coincides with the Jacobson radical $J(R)$ of $R$.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.
-
Rings Whose Invertible Elements Are Weakly Nil-Clean
Authors:
Peter Danchev,
Omid Hasanzadeh,
Arash Javan,
Ahmad Moussavi
Abstract:
We study those rings in which all invertible elements are weakly nil-clean calling them {\it UWNC rings}. This somewhat extends results due to Karimi-Mansoub et al. in Contemp. Math. (2018), where rings in which all invertible elements are nil-clean were considered abbreviating them as {\it UNC rings}. Specifically, our main achievements are that the triangular matrix ring ${\rm T}_n(R)$ over a ri…
▽ More
We study those rings in which all invertible elements are weakly nil-clean calling them {\it UWNC rings}. This somewhat extends results due to Karimi-Mansoub et al. in Contemp. Math. (2018), where rings in which all invertible elements are nil-clean were considered abbreviating them as {\it UNC rings}. Specifically, our main achievements are that the triangular matrix ring ${\rm T}_n(R)$ over a ring $R$ is UWNC precisely when $R$ is UNC. Besides, the notions UWNC and UNC do coincide when $2 \in J(R)$. We also describe UWNC $2$-primal rings $R$ by proving that $R$ is a ring with $J(R) = {\rm Nil}(R)$ such that $U(R)=\pm 1+{\rm Nil}(R)$. In particular, the polynomial ring $R[x]$ over some arbitrary variable $x$ is UWNC exactly when $R$ is UWNC. Some other relevant assertions are proved in the present direction as well.
△ Less
Submitted 3 February, 2024; v1 submitted 21 January, 2024;
originally announced January 2024.
-
Rings Whose Clean and Nil-Clean Elements Have Some Clean-Like Properties
Authors:
Peter Danchev,
Arash Javan,
Ahmad Moussavi
Abstract:
We define two types of rings, namely the so-called CSNC and NCUC that are those rings whose clean elements are strongly nil-clean, respectively, whose nil-clean elements are uniquely clean. Our results obtained in this paper somewhat expand these obtained by Calugareanu-Zhou in Mediterr. J. Math. (2023) and by Cui-Danchev-** in Publ. Math. Debrecen (2024), respectively.
We define two types of rings, namely the so-called CSNC and NCUC that are those rings whose clean elements are strongly nil-clean, respectively, whose nil-clean elements are uniquely clean. Our results obtained in this paper somewhat expand these obtained by Calugareanu-Zhou in Mediterr. J. Math. (2023) and by Cui-Danchev-** in Publ. Math. Debrecen (2024), respectively.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
On Some Extensions of $π$-Regular Rings
Authors:
Peter Danchev,
Arash Javan,
Ahmad Moussavi
Abstract:
Some variations of $π$-regular and nil clean rings were recently introduced in \cite{5,8,7}, respectively. In this paper, we examine the structure and relationships between these classes of rings. Specifically, we prove that $(m, n)$-regularly nil clean rings are left-right symmetric and also show that the inclusions ($D$-regularly nil clean) $\subseteq$ (regularly nil clean) $\subseteq$ ($(m,n)$-…
▽ More
Some variations of $π$-regular and nil clean rings were recently introduced in \cite{5,8,7}, respectively. In this paper, we examine the structure and relationships between these classes of rings. Specifically, we prove that $(m, n)$-regularly nil clean rings are left-right symmetric and also show that the inclusions ($D$-regularly nil clean) $\subseteq$ (regularly nil clean) $\subseteq$ ($(m,n)$-regularly nil clean) hold, as well as we answer Questions 1, 2 and 3 posed in \cite{8}. Moreover, some other analogous questions concerning the symmetric properties of certain classes of rings are treated as well by proving that centrally Utumi rings are always strongly $π$-regular.
△ Less
Submitted 13 May, 2024; v1 submitted 11 December, 2023;
originally announced December 2023.
-
Rings With $u^n-1$ Nilpotent For Each Unit $u$
Authors:
Peter Danchev,
Arash Javan,
Ahmad Moussavi
Abstract:
We continue the study in-depth of the so-called $n$-UU rings for any $n\geq 1$, that were defined by the first-named author in Toyama Math. J. (2017) as those rings $R$ for which $u^n-1$ is always a nilpotent for every unit $u\in R$. Specifically, for any $n\geq 2$, we prove that a ring is strongly $n$-nil-clean if, and only if, it is simultaneously strongly $π$-regular and an $(n-1)$-UU ring. Thi…
▽ More
We continue the study in-depth of the so-called $n$-UU rings for any $n\geq 1$, that were defined by the first-named author in Toyama Math. J. (2017) as those rings $R$ for which $u^n-1$ is always a nilpotent for every unit $u\in R$. Specifically, for any $n\geq 2$, we prove that a ring is strongly $n$-nil-clean if, and only if, it is simultaneously strongly $π$-regular and an $(n-1)$-UU ring. This somewhat extends results due to Diesl in J. Algebra (2013), Abyzov in Sib. Math. J. (2019) and Cui-Danchev in J. Algebra Appl. (2020). Moreover, our results somewhat improves the ones obtained by Ko$ş$an et al. in Hacettepe J. Math. Stat. (2020).
△ Less
Submitted 3 February, 2024; v1 submitted 25 November, 2023;
originally announced November 2023.
-
Dependency Practices for Vulnerability Mitigation
Authors:
Abbas Javan Jafari,
Diego Elias Costa,
Ahmad Abdellatif,
Emad Shihab
Abstract:
Relying on dependency packages accelerates software development, but it also increases the exposure to security vulnerabilities that may be present in dependencies. While developers have full control over which dependency packages (and which version) they use, they have no control over the dependencies of their dependencies. Such transitive dependencies, which often amount to a greater number than…
▽ More
Relying on dependency packages accelerates software development, but it also increases the exposure to security vulnerabilities that may be present in dependencies. While developers have full control over which dependency packages (and which version) they use, they have no control over the dependencies of their dependencies. Such transitive dependencies, which often amount to a greater number than direct dependencies, can become infected with vulnerabilities and put software projects at risk. To mitigate this risk, Practitioners need to select dependencies that respond quickly to vulnerabilities to prevent the propagation of vulnerable code to their project. To identify such dependencies, we analyze more than 450 vulnerabilities in the npm ecosystem to understand why dependent packages remain vulnerable. We identify over 200,000 npm packages that are infected through their dependencies and use 9 features to build a prediction model that identifies packages that quickly adopt the vulnerability fix and prevent further propagation of vulnerabilities. We also study the relationship between these features and the response speed of vulnerable packages. We complement our work with a practitioner survey to understand the applicability of our findings. Developers can incorporate our findings into their dependency management practices to mitigate the impact of vulnerabilities from their dependency supply chain.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Dependency Update Strategies and Package Characteristics
Authors:
Abbas Javan Jafari,
Diego Elias Costa,
Emad Shihab,
Rabe Abdalkareem
Abstract:
Managing project dependencies is a key maintenance issue in software development. Developers need to choose an update strategy that allows them to receive important updates and fixes while protecting them from breaking changes. Semantic Versioning was proposed to address this dilemma but many have opted for more restrictive or permissive alternatives. This empirical study explores the association…
▽ More
Managing project dependencies is a key maintenance issue in software development. Developers need to choose an update strategy that allows them to receive important updates and fixes while protecting them from breaking changes. Semantic Versioning was proposed to address this dilemma but many have opted for more restrictive or permissive alternatives. This empirical study explores the association between package characteristics and the dependency update strategy selected by its dependents to understand how developers select and change their update strategies. We study over 112,000 npm packages and use 19 characteristics to build a prediction model that identifies the common dependency update strategy for each package. Our model achieves a minimum improvement of 72% over the baselines and is much better aligned with community decisions than the npm default strategy. We investigate how different package characteristics can influence the predicted update strategy and find that dependent count, age and release status to be the highest influencing features. We complement the work with qualitative analyses of 160 packages to investigate the evolution of update strategies. While the common update strategy remains consistent for many packages, certain events such as the release of the 1.0.0 version or breaking changes influence the selected update strategy over time.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Classification and Segmentation of Pulmonary Lesions in CT Images Using a Combined VGG-XGBoost Method, and an Integrated Fuzzy Clustering-Level Set Technique
Authors:
Niloofar Akhavan Javan,
Ali Jebreili,
Babak Mozafari,
Morteza Hosseinioun,
S. AmirAli Gh. Ghahramani
Abstract:
Given that lung cancer is one of the deadliest illnesses, early identification and diagnosis are critical to preserving a patient's life. However, lung illness diagnosis is time-intensive and requires the expertise of a pulmonary disease specialist, subject to a significant rate of inaccuracy. Our objective is to design a system capable of accurately detecting and classifying lung lesions and segm…
▽ More
Given that lung cancer is one of the deadliest illnesses, early identification and diagnosis are critical to preserving a patient's life. However, lung illness diagnosis is time-intensive and requires the expertise of a pulmonary disease specialist, subject to a significant rate of inaccuracy. Our objective is to design a system capable of accurately detecting and classifying lung lesions and segmenting them in CT-scan images. The suggested technique extracts features automatically from the CT-scan image and then classifies them using Ensemble Gradient Boosting methods. Finally, if a lesion is detected in the CT-scan image, it is segmented using a hybrid approach based on Fuzzy Clustering and Level Set. To train and test our models we gathered a dataset that included CT images of patients residing in Mashhad, Iran. Finally, the results indicate 96% accuracy within this dataset. This approach may assist clinicians in diagnosing lung abnormalities and avoiding potential errors.
△ Less
Submitted 5 April, 2022; v1 submitted 4 January, 2021;
originally announced January 2021.
-
Dependency Smells in JavaScript Projects
Authors:
Abbas Javan Jafari,
Diego Elias Costa,
Rabe Abdalkareem,
Emad Shihab,
Nikolaos Tsantalis
Abstract:
Dependency management in modern software development poses many challenges for developers who wish to stay up to date with the latest features and fixes whilst ensuring backwards compatibility. Project maintainers have opted for varied, and sometimes conflicting, approaches for maintaining their dependencies. Opting for unsuitable approaches can introduce bugs and vulnerabilities into the project,…
▽ More
Dependency management in modern software development poses many challenges for developers who wish to stay up to date with the latest features and fixes whilst ensuring backwards compatibility. Project maintainers have opted for varied, and sometimes conflicting, approaches for maintaining their dependencies. Opting for unsuitable approaches can introduce bugs and vulnerabilities into the project, introduce breaking changes, cause extraneous installations, and reduce dependency understandability, making it harder for others to contribute effectively. In this paper, we empirically examine evidence of recurring dependency management issues (dependency smells). We look at the commit data for a dataset of 1,146 active JavaScript repositories to catalog, quantify and understand dependency smells. Through a series of surveys with practitioners, we identify and quantify seven dependency smells with varying degrees of popularity and investigate why they are introduced throughout project history. Our findings indicate that dependency smells are prevalent in JavaScript projects with two or more distinct smells appearing in 80% of the projects, but they generally infect a minority of a project's dependencies. Our observations show that the number of dependency smells tend to increase over time. Practitioners agree that dependency smells bring about many problems including security threats, bugs, dependency breakage, runtime errors, and other maintenance issues. These smells are generally introduced as developers react to dependency misbehaviour and the shortcomings of the npm ecosystem.
△ Less
Submitted 18 August, 2021; v1 submitted 27 October, 2020;
originally announced October 2020.
-
From Laser Induced Line Narrowing To Electromagnetically Induced Transparency: Closed System Analysis
Authors:
Hwang Lee,
Yuri Rostovtsev,
Chris J. Bednar,
Ali Javan
Abstract:
Laser induced line narrowing effect, discovered more than thirty years ago, can also be applied to recent studies in high resolution spectroscopy based on electromagnetically induced transparency. In this paper we first present a general form of the transmission width of electromagnetically induced transparency in a homogeneously broadened medium. We then analyze a Doppler broadened medium by us…
▽ More
Laser induced line narrowing effect, discovered more than thirty years ago, can also be applied to recent studies in high resolution spectroscopy based on electromagnetically induced transparency. In this paper we first present a general form of the transmission width of electromagnetically induced transparency in a homogeneously broadened medium. We then analyze a Doppler broadened medium by using a Lorentzian function as the atomic velocity distribution. The dependence of the transmission linewidth on the driving field intensity is discussed and compared to the laser induced line narrowing effect. This dependence can be characterized by a parameter which can be regarded as ``the degree of optical pum**''.
△ Less
Submitted 15 March, 2002;
originally announced March 2002.
-
Narrowing of EIT resonance in a Doppler Broadened Medium
Authors:
Ali Javan,
Olga Kocharovskaya,
Hwang Lee,
Marlan O. Scully
Abstract:
We derive an analytic expression for the linewidth of EIT resonance in a Doppler broadened system. It is shown here that for relatively low intensity of the driving field the EIT linewidth is proportional to the square root of intensity and is independent of the Doppler width, similar to the laser induced line narrowing effect by Feld and Javan. In the limit of high intensity we recover the usua…
▽ More
We derive an analytic expression for the linewidth of EIT resonance in a Doppler broadened system. It is shown here that for relatively low intensity of the driving field the EIT linewidth is proportional to the square root of intensity and is independent of the Doppler width, similar to the laser induced line narrowing effect by Feld and Javan. In the limit of high intensity we recover the usual power broadening case where EIT linewidth is proportional to the intensity and inversely proportional to the Doppler width.
△ Less
Submitted 2 November, 2001; v1 submitted 1 August, 2001;
originally announced August 2001.