Follow
Mohammed Abdul Hameed
Mohammed Abdul Hameed
استاذ في الرياضيات - جامعة الكوفة - كلية التربية الاساسية
Verified email at uokufa.edu.iq - Homepage
Title
Cited by
Cited by
Year
Image encryption based on singular value decomposition
NK El Abbadi, A Mohamad, M Abdul-Hameed
Journal of Computer Science 10 (7), 1222, 2014
192014
An algorithm based on gsvd for image encryption
MAHJ Al-Kufi, HR Hashim, AM Hussein, HR Mohammed
Math. Comput. Appl 22 (28), 10.3390, 2017
18*2017
On the reliability and stability of direct explicit Runge-Kutta integrators
MS Mechee, ZM Hussain, HR Mohammed
Global Journal of Pure and Applied Mathematics 12 (4), 3959-3975, 2016
152016
Image Compression based on SVD and MPQ-BTC.
NK El Abbadi, A Al Rammahi, DS Redha, M AbdulHameed
J. Comput. Sci. 10 (10), 2095-2104, 2014
152014
Text encryption based on singular value decomposition
NK El Abbadi, AM Al Rammahi, M Abdul-Hameed, D SHAKIR
European Academic Research 2 (4), 4631-42, 2014
42014
Mr.kufi
mohammed alkufi
TEST Engineering & Management 83 (12 June 2020), 28098-28111, 2020
2020
Investigate the Effect Excess Oxygen on the Clinker Quality in the Rotary kiln
HMJMMNALZ Mohammed Abdul Hameed Jassim Al‐Kufi
Elixir International Journal 126 (2019), 52517-52523, 2019
2019
An Estimate of the Reliability of the Rayleigh Distribution in the Reliability Stress Strength Using Bayesian Method and Robust fit Method
, mohammed abdul-hameed jassim
Journal of Engineering and Applied Sciences 14 (3), 927-930, 2019
2019
Investigate the Effect Excess Oxygen on the Clinker Quality in the Rotary kiln.
MMNALZ , mohammed abdul-hameed jassim , Hassan Mohammed Jassim
Elixir International Journal 126 (2019), 52517-52523, 2019
2019
MK-Theorem1: FOR all X Belongs to Z . 1)X=-X 2) IF X IS EVEN NUMBER THEN X=0 3) IF X IS ODD NUMBER THEN X=1
mohammed abdul-hameed jassim
Elixir International Journal 127 (127 (2019)), 52599-52600, 2019
2019
Block Truncation Coding (BTC) Technique for Regions Image Encryption
SAY Alkufi, HR Mohammed, MS Mechee
International Journal of Applied Engineering Research 13 (6), 3425-3429, 2018
2018
IMAGE CRYPTOGRAPHY VIA SVD MODULAR NUMBERS
MA Hameed
European Journal of Scientific Research V.138 N.2 138 (2), 5-29, 2016
2016
Text and Image Encryption via text and image keys using Singular Value Decomposition‏‎
mohammed abdul-hameed & Adil al-rammahi
international journal of engineering and future tecnology 1 (1), 1-16, 2016
2016
Use the Singular Values Decomposition in the Text Encryption with Encryption Key Is Real Number
MA Hameed
( International Journal of Innovative Research in Computer and Communication …, 2016
2016
Text encryption with singular values
M Abdul-Hameed
Image encryption with General Singular Values Decomposition via logistic function by encryption key only real number (method-2)
M Abdul-Hameed
Text Encryption by Image Encryption key with Based on Generalized Singular Value Decomposition (GSVD)
M Abdul-Hameed
Text Encryption with Singular Values Decomposition Aided-level one
M Abdul-Hameed
The system can't perform the operation now. Try again later.
Articles 1–18