Preferred Language
Articles
/
ijs-2404
Approximation of Modified Baskakov Operators Based on Parameter s

In this article, we define and study a family of modified Baskakov type operators based on a parameter . This family is a generalization of the classical Baskakov sequence. First, we prove that it converges to the function being approximated. Then, we find a Voronovsky-type formula and obtain that the order of approximation of this family is . This order is better than the order of the classical Baskakov sequence  whenever . Finally, we apply our sequence to approximate two test functions and analyze the numerical results obtained.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Crossref (1)
Crossref
View Publication
Publication Date
Tue May 01 2018
Journal Name
2018 2nd Ieee Advanced Information Management,communicates,electronic And Automation Control Conference (imcec)
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
Scopus (1)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Invertible Operators on Soft Normed Spaces

Despite ample research on soft linear spaces, there are many other concepts that can be studied. We introduced in this paper several new concepts related to the soft operators, such as the invertible operator.  We investigated some properties of this kind of operators and defined the spectrum of soft linear operator along with a number of concepts related with this definition; the concepts of eigenvalue, eigenvector, eigenspace are defined. Finally the spectrum of the soft linear operator was divided into three disjoint parts.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
Crossref (2)
Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
Parameters Estimation for Modified Weibull Distribution Based on Type One Censored Samplest

The three parameters distribution called modified weibull distribution (MWD) was introduced first by Sarhan and Zaindin (2009)[1]. In theis paper, we deal with interval estimation to estimate the parameters of modified weibull distribution based on singly type one censored data, using Maximum likelihood method and fisher information to obtain the estimates of the parameters for modified weibull distribution, after that applying this technique to asset of real data which taken for Leukemia disease in the hospital of central child teaching .

View Publication Preview PDF
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Quasi-posinormal operators

In this paper, we introduce a class of operators on a Hilbert space namely quasi-posinormal operators that contain properly the classes of normal operator, hyponormal operators, M–hyponormal operators, dominant operators and posinormal operators . We study some basic properties of these operators .Also we are looking at the relationship between invertibility operator and quasi-posinormal operator .

Crossref
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
On The Normality Set of Linear Operators

            In this paper, the Normality set  will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of  .

 

Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF