Preferred Language
Articles
/
jih-1571
On Application of Discrete Logarithms in Information - Hiding and Knapsack Problem with New Properties of Sk-Sets
...Show More Authors

Discrete   logarithms  are applied      in many    cryptographic problems  . For instance ,   in public   key .  and for construction of sets with disti nct sums of  k-clcments.  The   purpose o r  this   paper

is  to  modify  the  method ol' informationl1·iding  using        discrete logarithms  , introduce new properties of St - sets ,   uscdthe direct product   of    groups   to construct  cyclic group and finally, present modified   method   for   knapsack    problem using each of discrere logarithms and S,-sets.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
 - Semi-Regular Closed Sets
...Show More Authors

   In this paper, a new class of sets, namely - semi-regular closed sets is introduced and studied for topological spaces. This class properly contains the class of semi--closed sets and is property contained in the class of pre-semi-closed sets. Also, we introduce and study srcontinuity and sr-irresoleteness. We showed that sr-continuity falls strictly in between semi-- continuity and pre-semi-continuity.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Analysis of a harvested discrete-time biological models
...Show More Authors

This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.

Scopus (6)
Scopus
Publication Date
Sun Nov 10 2019
Journal Name
Journal Of Engineering And Applied Sciences
Discrete Fracture Network and Fractured Reservoir Characterization in Khabaz Field-Tertiary Formation
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jan 24 2020
Journal Name
Iraqi Journal Of Agricultural Sciences
RESPONSE OF ABELMOSCHUS ESCULENTUS L. FORINOCULATION WITH MYCORRHIZAE AND FOLAIR APPLICATION WITH BIO-STIMULATORS AND EFFECT ON VEGETATIVE GROWTH CHARACTERS
...Show More Authors

The current study  was carried out at the Fields belongs of Horticulture  Department, Collage of Agricultural Engineering Science, University of  Baghdad, Al-Jadiriyah for the spring season 2016 -2017 to study the effect for  inoculation mycorrhizae and  folair application  with bio stimulators and their interaction in the growth characters of  (local okra  ptera). A factorial experiment  (2  in randomized complete block design (RCBD), the experiment included (12) treatment  Distributed  in three  replicates. The three factors used in this experiment included . The inoculation with control (C) Mycorrhizae  ( M ) , Biozyme  (B ) ( B1 2cm3.L-1), ( B2 4cm1-.L-1) , Phosphalas (P) (P 2cm3.L-1),  ( M + B1), ( M + B2), (P +

... Show More
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Solution of Nonlinear Singular Boundary Value Problem
...Show More Authors

    This paper is devoted to the analysis of nonlinear singular boundary value problems for ordinary differential equations with a singularity of the different kind. We propose semi - analytic technique using two point osculatory interpolation to construct polynomial solution, and discussion behavior of the solution in the neighborhood of the singular points and its numerical approximation. Two examples are presented to demonstrate the applicability and efficiency of the methods. Finally, we discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Logical thinking and its relation with problem Solving among female instructors in the university
...Show More Authors

problems with its unobvious effect on scientific creativity and information. Problem solving is one of main goals of researchers because it develops their right logical thinking methods. The present study aims at measuring logical thinking among female it structures in the university mea swing problem solving among them ,identifying statically differences significance in logical thinking among female instructors in the university according to (Specialization Variable), identifying differences significance in problem Solving among female instructions in the university according to ( Specialization Variable) and identifying the Correlation between logical thinking and problem solving among female instructors in the university. The sample c

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Some new properties of soft Lc-spaces
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Expression of Syndecan 1 on Periodontium treated with Topical Application of Aloe-Vera
...Show More Authors

Background: Periodontium mainly exposed to injury by trauma or pathologic diseases, Aloe vera is a plant has many basic ingredients in its extracted gel that acts as wound healing accelerator in addition to that it's safe, and economical and without recordable of side effect. This study aimed is to evaluate the effect of topical application of Aloe vera on expression of syndecan -1 by periodontium tissue. Materials and methods: Thirty six male Albino rats were subjected for periodontium defect by electric scaler on the distal sides of both lower anterior teeth. The animals divided into two groups; control group (without treatment) and the experimental group treated with 1µLAloe vera gel/normal saline. Periodontal healing was examined at

... Show More
View Publication Preview PDF
Crossref (2)
Crossref