Preferred Language
Articles
/
gReFvY0BVTCNdQwCgBr7
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Discrete Mathematical Sciences &amp; Cryptography
On gamma T_pure submodules
...Show More Authors

A gamma T_ pure sub-module also the intersection property for gamma T_pure sub-modules have been studied in this action. Different descriptions and discuss some ownership, as Γ-module Z owns the TΓ_pure intersection property if and only if (J2 ΓK ∩ J^2  ΓF)=J^2 Γ(K ∩ F) for each Γ-ideal J and for all TΓ_pure K, and F in Z Q/P is TΓ_pure sub-module in Z/P, if P in Q.

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Revista Aus
On Simply* Compact Spaces
...Show More Authors

In the present paper, a simply* compact spaces was introduced it defined over simply*- open set previous knowledge and we study the relation between the simply* separation axioms and the compactness, in addition to introduce a new types of functions known as 𝛼𝑆 𝑀∗ _irresolte , 𝛼𝑆 𝑀∗ __𝑐𝑜𝑛𝑡𝑖𝑛𝑢𝑜𝑢𝑠 and 𝑅 𝑆 𝑀∗ _ continuous, which are defined between two topological spaces.

Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
On Preradical of Semimodules
...Show More Authors

In this paper we study the notion of preradical on some subcategories of the category of semimodules and homomorphisms of semimodules.
Since some of the known preradicals on modules fail to satisfy the conditions of preradicals, if the category of modules was extended to semimodules, it is necessary to investigate some subcategories of semimodules, like the category of subtractive semimodules with homomorphisms and the category of subtractive semimodules with ҽҟ-regular homomorphisms.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Mathematical Forum
On mildly-regular space
...Show More Authors

In this paper mildly-regular topological space was introduced via the concept of mildly g-open sets. Many properties of mildly - regular space are investigated and the interactions between mildly-regular space and certain types of topological spaces are considered. Also the concept of strong mildly-regular space was introduced and a main theorem on this space was proved.

View Publication
Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
On Primary Multipliction Modules
...Show More Authors

Let R be a commutative ring with identity and M be a unitary R- module. We shall say that M is a primary multiplication module if every primary submodule of M is a multiplication submodule of M. Some of the properties of this concept will be investigated. The main results of this paper are, for modules M and N, we have M N and HomR (M, N) are primary multiplications R-modules under certain assumptions.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
On S*-Supplemented Modules
...Show More Authors

The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.

View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
On J–Lifting Modules
...Show More Authors
Abstract<p>Let R be a ring with identity and M is a unitary left R–module. M is called J–lifting module if for every submodule N of M, there exists a submodule K of N such that <inline-formula> <tex-math><?CDATA ${\rm{M}} = {\rm{K}} \oplus \mathop {\rm{K}}\limits^\prime,\>\mathop {\rm{K}}\limits^\prime \subseteq {\rm{M}}$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block" overflow="scroll"> <mrow> <mi mathvariant="normal">M</mi> <mo>=</mo> <mi mathvariant="normal">K</mi></mrow></math></inline-formula></p> ... Show More
View Publication
Scopus (4)
Scopus Crossref