Preferred Language
Articles
/
jih-533
Classification and Construction of (k,3)-Arcs on Projective Plane Over Galois Field GF(9)
...Show More Authors

  In this work, we construct and classify the projectively distinct (k,3)-arcs in PG(2,9), where k ≥ 5, and prove that the complete (k,3)-arcs do not exist, where 5 ≤ k ≤ 13. We found that the maximum complete (k,3)-arc in PG(2,q) is the (16,3)-arc and the minimum complete (k,3)-arc in PG(2,q) is the (14,3)-arc. Moreover, we found the complete (k,3)-arcs between them.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Splitting of PG(1,27) by Sets, Orbits, and Arcs on the Conic
...Show More Authors

This research aims to give a splitting structure of the projective line over the finite field of order twenty-seven that can be found depending on the factors of the line order. Also, the line was partitioned by orbits using the companion matrix. Finally, we showed the number of projectively inequivalent -arcs on the conic  through the standard frame of the plane PG(1,27)

View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
On δ-Small Projective Modules
...Show More Authors

Let be a commutative ring with unity and let be a non-zero unitary module. In
this work we present a -small projective module concept as a generalization of small
projective. Also we generalize some properties of small epimorphism to δ-small
epimorphism. We also introduce the notation of δ-small hereditary modules and δ-small
projective covers.

View Publication Preview PDF
Publication Date
Tue Dec 03 2013
Journal Name
Baghdad Science Journal
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Two unsupervised classifiers for optimum multithreshold are presented; fast Otsu and k-means. The unparametric methods produce an efficient procedure to separate the regions (classes) by select optimum levels, either on the gray levels of image histogram (as Otsu classifier), or on the gray levels of image intensities(as k-mean classifier), which are represent threshold values of the classes. In order to compare between the experimental results of these classifiers, the computation time is recorded and the needed iterations for k-means classifier to converge with optimum classes centers. The variation in the recorded computation time for k-means classifier is discussed.

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Designing A Computer Program to Determine the Points and Planes in 3-Dimensional Projective Space
...Show More Authors

  The purpose of this work is to determine the points and planes of 3-dimensional projective space PG(3,2) over Galois field GF(q), q=2,3 and 5 by designing a computer program.

View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
On δ-small M-Projective Modules
...Show More Authors

In this paper we study the concepts of δ-small M-projective module and δ-small M-pseudo projective Modules as a generalization of M-projective module and M-Pseudo Projective respectively and give some results.

View Publication Preview PDF
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
On δ-small M-Projective Modules
...Show More Authors

In this paper we study the concepts of δ-small M-projective module and δ-small M-pseudo projective Modules as a generalization of M-projective module and M-Pseudo Projective respectively and give some results.

View Publication Preview PDF