Preferred Language
Articles
/
uRf5L48BVTCNdQwCaV5l
The Use of First Order Polynomial with Double Scalar Quantization for Image Compression

Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Convergence of the Generalized Homotopy Perturbation Method for Solving Fractional Order Integro-Differential Equations

In this paper,the homtopy perturbation method (HPM) was applied to obtain the approximate solutions of the fractional order integro-differential equations . The fractional order derivatives and fractional order integral are described in the Caputo and Riemann-Liouville sense respectively. We can easily obtain the solution from convergent the infinite series of HPM . A theorem for convergence and error estimates of the HPM for solving fractional order integro-differential equations was given. Moreover, numerical results show that our theoretical analysis are accurate and the HPM can be considered as a powerful method for solving fractional order integro-diffrential equations.

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon May 01 2017
Journal Name
Ieee International Electrical Machines & Drives Conference Ieee (iemdc2017), Miami, Usa
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Discrimination of Malignant from Acute Benign Compression Spinal Fractures with Magnetic Resonance imaging

Background: Differentiation between malignant and benign vertebral compression fracture is often problematic. This is precisely difficult in elderly who are predisposed to benign compression caused by osteoporosis .Establishing correct diagnosis is of great importance in determining the treatment andprognosis.A study was performed to determine which magnetic resonance imaging findings are useful in discrimination between metastatic and acute osteoporotic compression fractures of the spine. Recently MRI is being increasingly used for evaluation of these fractures.Objectives: The aim of this study is to establish the correct diagnosis of malignant and benign compression vertebral fracture by MRI to determine treatment and prognosis.Methods

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Buckling Behavior of Aluminum Alloy Thin-Walled Beam with Holes under Compression Loading

Thin-walled members are increasingly used in structural applications, especially in light structures like in constructions and aircraft structures because of their high strength-to-weight ratio. Perforations are often made on these structures for reducing weight and to facilitate the services and maintenance works like in aircraft wing ribs. This type of structures suffers from buckling phenomena due to its dimensions, and this suffering increases with the presence of holes in it. This study investigated experimentally and numerically the buckling behavior of aluminum alloy 6061-O thin-walled lipped channel beam with specific holes subjected to compression load. A nonlinear finite elements analysis was used to obtain the

... Show More
Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
Crossref
View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
The effect of the Coefficient Function on the Solution Behavior for the Second-Order Complex Differential Equation

The purpose of this research paper is to present the second-order homogeneous complex differential equation   , where   , which is defined on the certain complex domain depends on solution behavior. In order to demonstrate  the relationship between the solution of the second-order of the complex differential equation and its coefficient of function, by studying the solution in certain cases: a meromorphic function, a coefficient of function, and if the solution is considered to be a transformation with another complex solution. In addition, the solution has been provided as a power series with some  applications.

 

Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Applied And Computational Mathematics
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces

In this paper reliable computational methods (RCMs) based on the monomial stan-dard polynomials have been executed to solve the problem of Jeffery-Hamel flow (JHF). In addition, convenient base functions, namely Bernoulli, Euler and Laguerre polynomials, have been used to enhance the reliability of the computational methods. Using such functions turns the problem into a set of solvable nonlinear algebraic system that MathematicaⓇ12 can solve. The JHF problem has been solved with the help of Improved Reliable Computational Methods (I-RCMs), and a review of the methods has been given. Also, published facts are used to make comparisons. As further evidence of the accuracy and dependability of the proposed methods, the maximum error remainder

... Show More
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Image Segmentation for Skin Detection

Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu

... Show More
Crossref (4)
Crossref
View Publication
Publication Date
Wed Aug 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Watermarking for Mobile Device

The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore,  the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of  the mobile network and its wide usage through  different types  of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat

... Show More
View Publication Preview PDF