Image encryption based on singular value decomposition NK El Abbadi, A Mohamad, M Abdul-Hameed Journal of Computer Science 10 (7), 1222, 2014 | 19 | 2014 |
An algorithm based on gsvd for image encryption MAHJ Al-Kufi, HR Hashim, AM Hussein, HR Mohammed Math. Comput. Appl 22 (28), 10.3390, 2017 | 18* | 2017 |
On the reliability and stability of direct explicit Runge-Kutta integrators MS Mechee, ZM Hussain, HR Mohammed Global Journal of Pure and Applied Mathematics 12 (4), 3959-3975, 2016 | 15 | 2016 |
Image Compression based on SVD and MPQ-BTC. NK El Abbadi, A Al Rammahi, DS Redha, M AbdulHameed J. Comput. Sci. 10 (10), 2095-2104, 2014 | 15 | 2014 |
Text encryption based on singular value decomposition NK El Abbadi, AM Al Rammahi, M Abdul-Hameed, D SHAKIR European Academic Research 2 (4), 4631-42, 2014 | 4 | 2014 |
Mr.kufi mohammed alkufi TEST Engineering & Management 83 (12 June 2020), 28098-28111, 2020 | | 2020 |
Investigate the Effect Excess Oxygen on the Clinker Quality in the Rotary kiln HMJMMNALZ Mohammed Abdul Hameed Jassim Al‐Kufi Elixir International Journal 126 (2019), 52517-52523, 2019 | | 2019 |
An Estimate of the Reliability of the Rayleigh Distribution in the Reliability Stress Strength Using Bayesian Method and Robust fit Method , mohammed abdul-hameed jassim Journal of Engineering and Applied Sciences 14 (3), 927-930, 2019 | | 2019 |
Investigate the Effect Excess Oxygen on the Clinker Quality in the Rotary kiln. MMNALZ , mohammed abdul-hameed jassim , Hassan Mohammed Jassim Elixir International Journal 126 (2019), 52517-52523, 2019 | | 2019 |
MK-Theorem1: FOR all X Belongs to Z . 1)X=-X 2) IF X IS EVEN NUMBER THEN X=0 3) IF X IS ODD NUMBER THEN X=1 mohammed abdul-hameed jassim Elixir International Journal 127 (127 (2019)), 52599-52600, 2019 | | 2019 |
Block Truncation Coding (BTC) Technique for Regions Image Encryption SAY Alkufi, HR Mohammed, MS Mechee International Journal of Applied Engineering Research 13 (6), 3425-3429, 2018 | | 2018 |
IMAGE CRYPTOGRAPHY VIA SVD MODULAR NUMBERS MA Hameed European Journal of Scientific Research V.138 N.2 138 (2), 5-29, 2016 | | 2016 |
Text and Image Encryption via text and image keys using Singular Value Decomposition mohammed abdul-hameed & Adil al-rammahi international journal of engineering and future tecnology 1 (1), 1-16, 2016 | | 2016 |
Use the Singular Values Decomposition in the Text Encryption with Encryption Key Is Real Number MA Hameed ( International Journal of Innovative Research in Computer and Communication …, 2016 | | 2016 |
Text encryption with singular values M Abdul-Hameed | | |
Image encryption with General Singular Values Decomposition via logistic function by encryption key only real number (method-2) M Abdul-Hameed | | |
Text Encryption by Image Encryption key with Based on Generalized Singular Value Decomposition (GSVD) M Abdul-Hameed | | |
Text Encryption with Singular Values Decomposition Aided-level one M Abdul-Hameed | | |