Preferred Language
Articles
/
Nhh9r5YBVTCNdQwC1oaz
Exploring Neimark-Sacker Bifurcation and Chaos Control in a Tri-species Discrete-Time Model
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
The persistence and bifurcation analysis of an ecological model with fear effect involving prey refuge and harvesting
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Stability and bifurcation of a prey-predator system incorporating fear and refuge
...Show More Authors

It is proposed and studied a prey-predator system with a Holling type II functional response that merges predation fear with a predator-dependent prey's refuge. Understanding the impact of fear and refuge on the system's dynamic behavior is one of the objectives. All conceivable steady-states are investigated for their stability. The persistence condition of the system has been established. Local bifurcation analysis is performed in the Sotomayor sense. Extensive numerical simulation with varied parameters was used to explore the system's global dynamics. A limit cycle and a point attractor are the two types of attractors in the system. It's also interesting to note that the system exhibits bi-stability between these 2 types of attractors.

... Show More
View Publication Preview PDF
Scopus (12)
Scopus Clarivate Crossref
Publication Date
Fri Apr 26 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Solving Tri-criteria: Total Completion Time, Total Earliness, and Maximum Tardiness Using Exact and Heuristic Methods on Single-Machine Scheduling Problems
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Time in the Cinema...The Two Films (The Knife and The Deceived) -A Model: كريمة ناوي
...Show More Authors

This study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun).  If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world,   the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 24 2021
Journal Name
International Journal Of Differential Equations
The Impact of Media Coverage and Curfew on the Outbreak of Coronavirus Disease 2019 Model: Stability and Bifurcation
...Show More Authors

In this study, the spreading of the pandemic coronavirus disease (COVID-19) is formulated mathematically. The objective of this study is to stop or slow the spread of COVID-19. In fact, to stop the spread of COVID-19, the vaccine of the disease is needed. However, in the absence of the vaccine, people must have to obey curfew and social distancing and follow the media alert coverage rule. In order to maintain these alternative factors, we must obey the modeling rule. Therefore, the impact of curfew, media alert coverage, and social distance between the individuals on the outbreak of disease is considered. Five ordinary differential equations of the first-order are used to represent the model. The solution properties of the system ar

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Real-time control for the transmission of information in wireless networks
...Show More Authors

Wireless  lietworking is·  constantly improving,  changing  and

though  ba ic  principle  is the same.  ['nstead of  using standard  cables  to transmit information fmm one point to another (qr more), it .uses  radio signals.  This paper  presents .a case  study considedng real-time remote

cqntroJ using Wireless UDP/JP-based networks,. The aim of-this werk is to

reduce  real-time· remote control  system  based upon a simulatio.n  model,

which can operate via general communication  l"]etworks, whieh on bodies. modern wireles  tcchnolqgy.

The  first  part includes· a  brief

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamics of Double Chaos
...Show More Authors

stract         This paper includes studying (dynamic of double chaos) in two steps: First Step:- Applying ordinary differential equation have behaved chaotically such as (Duffing's equation) on (double pendulum) equation system to get new system of ordinary differential equations depend on it next step. Second Step:- We demonstrate existence of a dynamics of double chaos in Duffing's equation by relying on graphical result of Poincare's map from numerical simulation.

View Publication Preview PDF