Journal of Kufa for Mathematics and Computer最新文献

筛选
英文 中文
Text Cryptography via Special Polynomial Technique 基于特殊多项式技术的文本密码
Journal of Kufa for Mathematics and Computer Pub Date : 2022-03-30 DOI: 10.31642/jokmc/2018/090103
{"title":"Text Cryptography via Special Polynomial Technique","authors":"","doi":"10.31642/jokmc/2018/090103","DOIUrl":"https://doi.org/10.31642/jokmc/2018/090103","url":null,"abstract":"","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130477243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suggest a method for exchanging information in ad hoc networks 提出一种在自组织网络中交换信息的方法
Journal of Kufa for Mathematics and Computer Pub Date : 2022-03-30 DOI: 10.31642/jokmc/2018/090101
{"title":"Suggest a method for exchanging information in ad hoc networks","authors":"","doi":"10.31642/jokmc/2018/090101","DOIUrl":"https://doi.org/10.31642/jokmc/2018/090101","url":null,"abstract":"","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116993005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cyclic Decomposition of cf(Q_28×C_p)/ R ̅(Q_28×C_p) cf(Q_28×C_p)/ R (Q_28×C_p)的循环分解
Journal of Kufa for Mathematics and Computer Pub Date : 2022-03-30 DOI: 10.31642/jokmc/2018/090105
{"title":"The Cyclic Decomposition of cf(Q_28×C_p)/ R ̅(Q_28×C_p)","authors":"","doi":"10.31642/jokmc/2018/090105","DOIUrl":"https://doi.org/10.31642/jokmc/2018/090105","url":null,"abstract":"","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"99 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113990330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach for Solving Multi Products Transportation Problem 求解多产品运输问题的新方法
Journal of Kufa for Mathematics and Computer Pub Date : 2021-11-01 DOI: 10.31642/jokmc/2018/070201
Anwar Nsaif Jasim, Kadhim B. S. Aljanabi
{"title":"A New Approach for Solving Multi Products Transportation Problem","authors":"Anwar Nsaif Jasim, Kadhim B. S. Aljanabi","doi":"10.31642/jokmc/2018/070201","DOIUrl":"https://doi.org/10.31642/jokmc/2018/070201","url":null,"abstract":"— The problem of transportation is studied in many areas, most importantly in the field of logistics and \u0000operations management. The distribution problem of goods and commodities from sources to destinations is an \u0000important problem where many methods have been used to obtain its optimum solution, which represents the \u0000minimum cost of distribution the goods from sources to destinations. Generally, the transportation classical cost of \u0000one unit of a good is depending on the source and the destination. In this paper, we suggest an approach to obtain a \u0000solution to the transportation problem consisting of two products or more and then by using the modified Kruskal’s \u0000algorithm we find the minimum feasible solution.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of Wavelets for BVPs and Signal Processing 小波在bvp和信号处理中的应用
Journal of Kufa for Mathematics and Computer Pub Date : 2021-11-01 DOI: 10.31642/jokmc/2018/070203
Z. Alabacy
{"title":"Applications of Wavelets for BVPs and Signal Processing","authors":"Z. Alabacy","doi":"10.31642/jokmc/2018/070203","DOIUrl":"https://doi.org/10.31642/jokmc/2018/070203","url":null,"abstract":"The transfer of information using the signal needs speed, which leads to the compression of the information. \u0000It is only possible through the process of using a mathematical technique at work. \u0000To demonstrate an increase in theory efficiency, it was used in signal processing, compression, and good results. In \u0000section 4 Matrix was used because M=3 was taken, where six functions were obtained, when these functions \u0000were integrated, the operations matrix of integration was added, which was added to solve Boundary Value \u0000Problems (BVPs) numerically. In addition to solving problems numerically, using the proposed technique, which is \u0000signal processing, to demonstrate the efficiency of the proposed theory as indicated in section 2, wavelets are built on \u0000the dependence of the four effects . In addition, the number of equations obtained is calculated based on the \u0000value of where six functions are obtained and the greater value of is obtained More \u0000functions, leading to greater accuracy in obtaining the best results.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multiplicative-Additive Chaotic-Address Steganography 一种乘加性混沌地址隐写技术
Journal of Kufa for Mathematics and Computer Pub Date : 2021-11-01 DOI: 10.31642/jokmc/2018/070204
Haneen H. Alwan, Zahir M. Hussain
{"title":"A Multiplicative-Additive Chaotic-Address Steganography","authors":"Haneen H. Alwan, Zahir M. Hussain","doi":"10.31642/jokmc/2018/070204","DOIUrl":"https://doi.org/10.31642/jokmc/2018/070204","url":null,"abstract":"In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to generate the \u0000chaotic sequences which are used to track the addresses of shuffled bits in steganography. Three techniques are \u0000introduced for image steganography in the spatial domain. The first system is based on the well-known LSB \u0000technique, the second system is based on looking for the identical bits between the secret message and the cover \u0000image and the third system is based on the concept of LSB substitution, it is employed the mapping of secret data bits \u0000with cover pixel bits. It was tested and evaluated security levels for the proposed techniques by using the Peak \u0000Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis and tested the \u0000Chaotic sequences generated by using correlation, Lypaunov exponents, Poincaré section and 0-1Test. The results \u0000show that the proposed methods perform better than existed systems.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114842560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulate the processing of data loss in sensor networks by proposing a high speed encryption mechanism 通过提出一种高速加密机制,模拟了传感器网络中数据丢失的处理过程
Journal of Kufa for Mathematics and Computer Pub Date : 2021-11-01 DOI: 10.31642/jokmc/2018/070202
N. Jarah
{"title":"Simulate the processing of data loss in sensor networks by proposing a high speed encryption mechanism","authors":"N. Jarah","doi":"10.31642/jokmc/2018/070202","DOIUrl":"https://doi.org/10.31642/jokmc/2018/070202","url":null,"abstract":"Prepare network sensor as a context to achieve network community everywhere , it has made \u0000technological innovations sensor smaller and more efficient to use in the discovery of the ocean and gain valuable \u0000information, it can be as simple as a temperature gauge or as complicated as if used in military and dangerous areas \u0000In order to transmit information safely and without any loss, it is necessary to study a dedicated processing \u0000mechanism for calculating the encryption taking into account the reduction of power consumption of the sensor node. \u0000the network has been simulated using QualNet","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Modern Cryptography 现代密码学综述
Journal of Kufa for Mathematics and Computer Pub Date : 2021-09-19 DOI: 10.31642/jokmc/2018/070101
Mustafa Abd Zaid, Soukaena Hassan
{"title":"Survey on Modern Cryptography","authors":"Mustafa Abd Zaid, Soukaena Hassan","doi":"10.31642/jokmc/2018/070101","DOIUrl":"https://doi.org/10.31642/jokmc/2018/070101","url":null,"abstract":"Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from unauthorized individuals. Encryption is a mechanism of converting plain-text into cipher-text in order to be unreadable by unwanted people. In this review, we explain some important cryptography primitives ( symmetric and asymmetric cryptography algorithms) with examples for each type. Comparative study is making among this cryptography primitives according to many parameters such as structure, speed, block size and others parameters.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124084081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ZT1 spaces and semi-ZT1 spaces ZT1空间和半ZT1空间
Journal of Kufa for Mathematics and Computer Pub Date : 2021-08-30 DOI: 10.31642/jokmc/2018/080202
{"title":"ZT1 spaces and semi-ZT1 spaces","authors":"","doi":"10.31642/jokmc/2018/080202","DOIUrl":"https://doi.org/10.31642/jokmc/2018/080202","url":null,"abstract":"","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131008742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certain Types of Regular and T3 Spaces 某些类型的正则空间和T3空间
Journal of Kufa for Mathematics and Computer Pub Date : 2021-08-30 DOI: 10.31642/jokmc/2018/080201
{"title":"Certain Types of Regular and T3 Spaces","authors":"","doi":"10.31642/jokmc/2018/080201","DOIUrl":"https://doi.org/10.31642/jokmc/2018/080201","url":null,"abstract":"","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124228929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信