Preferred Language
Articles
/
uhc6WZABVTCNdQwCHIfk
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Al-nahrain Journal Of Science
Enhancing Sparse Adjacency Matrix for Community Detection in Large Networks
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Large-Coessential and Large-Coclosed Submodules
...Show More Authors

The goal of this research is to introduce the concepts of Large-coessential submodule and Large-coclosed submodule, for which some properties are also considered. Let M  be an R-module and K, N are submodules of M such that , then K is said to be Large-coessential submodule, if . A submodule N of M is called Large-coclosed submodule, if K is Large-coessential submodule of N in M, for some submodule K of N, implies that  .

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Large-Coessential and Large-Coclosed Submodules
...Show More Authors

The goal of this research is to introduce the concepts of Large-coessential submodule and Large-coclosed submodule, for which some properties are also considered. Let M  be an R-module and K, N are submodules of M such that , then K is said to be Large-coessential submodule, if . A submodule N of M is called Large-coclosed submodule, if K is Large-coessential submodule of N in M, for some submodule K of N, implies that  .

Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
On Large-Lifting and Large-Supplemented Modules
...Show More Authors

      In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules.  We also give some results and properties of this new kind of modules.

Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
On Large-Lifting and Large-Supplemented Modules
...Show More Authors

      In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules.  We also give some results and properties of this new kind of modules.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
On Large-Small submodule and Large-Hollow module
...Show More Authors
Abstract<p>The goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤<sub>e</sub> M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.</p>
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
ContractiveiMappings Having Mixed Finite MonotoneiProperty in GeneralizediMetric Spaces
...Show More Authors

In thisipaper, we introduce the concepts of the modified tupledicoincidence points and the  mixed finiteimonotone property. Also the existenceiand uniquenessiof modified tupled coincidenceipoint is discusses without continuous condition for mappings having imixed finite monotoneiproperty in generalizedimetric spaces.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref