Journal of Kufa for Mathematics and Computer最新文献

筛选
英文 中文
Number of Spinal-Convex Polyominoes 脊凸多项式的数目
Journal of Kufa for Mathematics and Computer Pub Date : 2019-12-20 DOI: 10.31642/jokmc/2018/060303
Eman F. Mohomme
{"title":"Number of Spinal-Convex Polyominoes","authors":"Eman F. Mohomme","doi":"10.31642/jokmc/2018/060303","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060303","url":null,"abstract":"— : In his paper we describe a restricted class of polyominoes called spinal-convex polyominoes. Spinal-convex polyominoes created by two columns such that column 1 (respectively, column2) with at most two set columns sequence of adjacent ominoes and column 2 (respectively, column1) with at least one set column sequence of adjacent ominoes. In addition, this study reveals new combinatorial method of enumerating spinal-convex polyominoes .","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125157713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certain properties of contra-T*12-continuous functions 反- t *12连续函数的若干性质
Journal of Kufa for Mathematics and Computer Pub Date : 2019-12-20 DOI: 10.31642/jokmc/2018/060302
H. Mustafa, Layth M. Alabdulsada
{"title":"Certain properties of contra-T*12-continuous functions","authors":"H. Mustafa, Layth M. Alabdulsada","doi":"10.31642/jokmc/2018/060302","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060302","url":null,"abstract":"The concept of contra function was introduced by Dontchev [2], in this work, we use the notion of T*12-open to study a new class of function called a contra-T*12-continuous function as a generalization of contra-continuous.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Condensation to Fractal Shapes Constructing 凝结到分形形状构造
Journal of Kufa for Mathematics and Computer Pub Date : 2019-12-20 DOI: 10.31642/jokmc/2018/060301
Adil Alrammahi
{"title":"Condensation to Fractal Shapes Constructing","authors":"Adil Alrammahi","doi":"10.31642/jokmc/2018/060301","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060301","url":null,"abstract":"Two properties must be available in order to construct a fractal set. The first is the selfsimilarity of the elements. The second is the real fraction number dimension. In this paper,condensation principle is introduced to construct fractal sets. Condensation idea is represented in threetypes. The first is deduced from rotation –reflection linear transformation. The second is dealt withgroup action. The third is represented by graph function.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object Detection and Recognition Using Local Quadrant Pattern Testing on The Skin Cancer Region 基于局部象限模式测试的皮肤癌区域目标检测与识别
Journal of Kufa for Mathematics and Computer Pub Date : 2019-09-20 DOI: 10.31642/jokmc/2018/060202
A. Hashim
{"title":"Object Detection and Recognition Using Local Quadrant Pattern Testing on The Skin Cancer Region","authors":"A. Hashim","doi":"10.31642/jokmc/2018/060202","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060202","url":null,"abstract":"Object detection and recognition is one of the important techniques in computer vision for searching and scanning and identifying an object in images or videos. Object detection and recognition enters into many important fields where one of the uses of object detection and recognition is to detect region of injury and determine the type of injury. This paper suggested a new effective method called Local Quadrant Pattern (LQP). The proposed method uses a window and passes it on all pixels of the image and uses the pixel direction to arrange the adjacent pixels. It also uses four code values to encode and then produce a texture feature matrix which is used to detect objects as well as extract features based on magnitude of pixels for image classification. The experiments were conducted on the infected regions in the skin and the results showed the ability of the method to detect regions of infection as well as the high accuracy in the classification of those regions. Keywords— Local Quadrant Pattern (LQP), Object Detection, Threshold, Local Ternary Pattern (LTP), Skin, Cancer","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Encrypt Images Using Mutation Methods 使用突变方法加密图像
Journal of Kufa for Mathematics and Computer Pub Date : 2019-09-20 DOI: 10.31642/jokmc/2018/060204
S. Kharofa
{"title":"Encrypt Images Using Mutation Methods","authors":"S. Kharofa","doi":"10.31642/jokmc/2018/060204","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060204","url":null,"abstract":"Abstract— As a result of the tremendous development of information and communications technology, especially after the wide spread of the internet, the process of preserving images has become a major and important subject. The most important method to preserve images is the use of encryption, which aims to ensure the preservation of the privacy of images and not allowing anyone to tamper with or view them because they are either confidential or very special. Also, no one can understand the content of those images unless they have a means of encryption. In this research, a new methods has been applied in images encryption using mutation methods. Different analysis like correlation coefficient, and histogram analysis is applied for the verification of the performance of the suggested algorithm. Matlab language has been used to implement the suggested algorithm, because of its efficiency, accuracy and flexibility in giving results.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiparty Quantum Cryptography with Block Cipher RC6 (BMQKD) 分组密码RC6 (BMQKD)多方量子密码
Journal of Kufa for Mathematics and Computer Pub Date : 2019-09-20 DOI: 10.31642/jokmc/2018/060201
Iqtidar Zohair
{"title":"Multiparty Quantum Cryptography with Block Cipher RC6 (BMQKD)","authors":"Iqtidar Zohair","doi":"10.31642/jokmc/2018/060201","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060201","url":null,"abstract":"The proposed B-MQKD method uses a quantum key distribution to generate a key and provide an authentication amongst many parties. It uses concepts of block cipher by using RC6 algorithm for encryption. The mix concept in B-MQKD (quantum and block cipher) gives the algorithm more authentication, randomness, and security which make it difficult to find the original message by attackers. In this paper using BB84 among three parties make it possiple to give the key to many users in a secret way.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pairwise locally compact and compactification in double topological spaces 重拓扑空间中的成对局部紧化与紧化
Journal of Kufa for Mathematics and Computer Pub Date : 2019-09-20 DOI: 10.31642/jokmc/2018/060203
R. R. Mohsin
{"title":"Pairwise locally compact and compactification in double topological spaces","authors":"R. R. Mohsin","doi":"10.31642/jokmc/2018/060203","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060203","url":null,"abstract":"The concept of intuitionistic topological space was introduced by Çoker. The aim of this paper is to generalize notions between bitopological spaces and double topological spaces and also give a notion of pairwise locally compact and compactification for double-topological spaces.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124591553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authentication of RSA via BAN logic 采用BAN逻辑的RSA认证
Journal of Kufa for Mathematics and Computer Pub Date : 2019-03-20 DOI: 10.31642/JOKMC/2018/060101
Israa N.A. Alsalhi, S. Albermany
{"title":"Authentication of RSA via BAN logic","authors":"Israa N.A. Alsalhi, S. Albermany","doi":"10.31642/JOKMC/2018/060101","DOIUrl":"https://doi.org/10.31642/JOKMC/2018/060101","url":null,"abstract":"DOI : http://dx.doi.org/10.31642/JoKMC/2018/060101 Abstract-Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network dynamically that leading to be many threats targeting this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential, and can it be used in cognitive radio networks.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of a Classifier Performance Testing Methods: Support Vector Machine Classifier on Mammogram Images Classification 一种分类器性能测试方法的比较:支持向量机分类器在乳房x光图像分类上的应用
Journal of Kufa for Mathematics and Computer Pub Date : 2019-03-20 DOI: 10.31642/JOKMC/2018/060102
S. J. Mohammed, Thekra Abbas
{"title":"Comparison of a Classifier Performance Testing Methods: Support Vector Machine Classifier on Mammogram Images Classification","authors":"S. J. Mohammed, Thekra Abbas","doi":"10.31642/JOKMC/2018/060102","DOIUrl":"https://doi.org/10.31642/JOKMC/2018/060102","url":null,"abstract":"— This paper compares between testing performance methods of classifier algorithm on a standard database of mammogram images. Mammographic interchange society dataset (MIAS) is used in this work. For classifying these images tumors a multiclass support vector machine (SVM) classifier is used. Evaluating this classifier accuracy for classifying the mammogram tumors into the malignant, benign or normal case is done using two evaluating classifier methods that are a hold-out method and one of the cross-validation methods. Then selecting the better test method depending on the obtained classifier accuracy and the running time consumed with each method. The classifier accuracy, training time and the classification time are considered for comparison purpose.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Some Interesting Properties of a Novel Subclass of Multivalent Function with Positive Coefficients 一类新的正系数多价函数子类的一些有趣性质
Journal of Kufa for Mathematics and Computer Pub Date : 2019-03-20 DOI: 10.31642/JOKMC/2018/060103
Aqeel AL-khafaji, W. Atshan, S. Abed
{"title":"Some Interesting Properties of a Novel Subclass of Multivalent Function with Positive Coefficients","authors":"Aqeel AL-khafaji, W. Atshan, S. Abed","doi":"10.31642/JOKMC/2018/060103","DOIUrl":"https://doi.org/10.31642/JOKMC/2018/060103","url":null,"abstract":"DOI : http://dx.doi.org/10.31642/JoKMC/2018/060103 Abstract— In this paper, we introduce a new class of multivalent functions defined by where is a subclass of analytic and multivalent functions in the open unit disc { | | }. Moreover, we consider and prove theorems explain Some of the geometric properties for such new class was such as, coefficient estimates, growth and distortion, extreme points, radii of starlikeness, convexity and close-to-convexity as well as the convolution properties for the class","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"531 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信