Preferred Language
Articles
/
PhdVMI8BVTCNdQwCil_C
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Aug 18 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Resource consumption accounting technique between traditional cost systems and contemporary cost management techniques in measuring the cost of products - A conceptual vision
...Show More Authors

The contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 18 2022
The modeling techniques of the second‐order correlation function <i>g</i> <sup>(2)</sup> ( <i>τ</i> ) for a quantum emitter
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
A Study of a-Si:H Absorption Edge Using Dunstan’s Model
...Show More Authors

The optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
International Journal On Technical And Physical Problems Of Engineering
Deep Learning Techniques For Skull Stripping of Brain MR Images
...Show More Authors

Deep Learning Techniques For Skull Stripping of Brain MR Images

Scopus (1)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu May 05 2022
Journal Name
5g Impact On Biomedical Engineering
Wireless Techniques and Applications of the Internet of Medical Things
...Show More Authors

View Publication
Crossref
Publication Date
Sat Nov 12 2016
Journal Name
International Journal Of Mechanical Engineering And Technology (ijmet)
PERFORMANCE OF TWO-WAY NESTING TECHNIQUES FOR SHALLOW WATER MODELS
...Show More Authors

A new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.

Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

View Publication
Crossref (15)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref