on certain subclasses of harmonic univalent functions with respect to k- symmetric points
Journal Article

The aim of the article is to study a sufficient condition for the classes of starlike and convex harmonic univalent functions with respect to k- symmetric points. The necessary condition for f to be in the classes will be studied. In addition, growth bounds for functions will also be given.

Entisar EL-Yagubi, (05-2015), Tokyo: International Information Institute, 18 (5), 1509-1520

A STUDY ON A CLASS OF P-VALENT FUNCTIONS ASSOCIATED WITH GENERALIZED HYPERGEOMETRIC FUNCTIONS
Journal Article

In this paper, we study and introduce the majorization properties of a new class of analytic p-valent functions of complex order defined by the generalized hypergeometric function. Some known consequences of our main result will be given. Moreover, we investigate the coefficient

estimates for this class.

Entisar EL-Yagubi, (04-2015), -: Vladikavkaz Mathematical Journal, 17 (1), 31-38

SOME PROPERTIES OF DIFFERENTIAL OPERATOR ASSOCIATED WITH GENERALIZED HYPERGEOMETRIC FUNCTIONS
Journal Article

In the present investigation, new subclasses of analytic functions in the open unit disk which are defined using generalized derivative operator are introduced. Several interesting properties of these classes are obtained.

Entisar EL-Yagubi, (03-2015), -: Tamkang Journal of Mathematics, 46 (1), 75-83

ENHANCEMENT OF AES ALGORITHM BASED ON CHAOTIC MAPS AND SHIFT OPERATION FOR IMAGE ENCRYPTION
Journal Article

With the rapid development of the Internet and communication networks, the confidentiality of digital

images transmitted over public networks must be preserved by using encryption techniques. Advanced

Encryption Standard (AES) is one of the most commonly used encryption algorithms at present. Although

AES has several advantages, such as security in data encryption, it also has a number of drawbacks, such as

high computations, pattern problems when used for encrypting images, and fixed S-box weak points. This

paper proposes a method that overcomes the fixed S-box weak points and improves the performance of

AES when used for encrypting images, particularly when the image data are large. In addition, the

MixColumn stage is replaced by chaotic mapping and XOR operation to reduce the high computations in

MixColumn transform. The proposed method is tested on several images, and the results show that the

proposed method efficiently generated cipher images with very low correlation coefficients of adjacent

pixels and provided better encryption speed and high security as a result of the dependence of the S-box on

the key characteristics of the chaotic system

TARIK IDBEAA, (01-2015), Islamabad, PAKISTAN: Journal of Theoretical and Applied Information Technology, 71 (1), 1-12

On the multiscale approximation of solutions to the slowly varying harvested logistic population model
Journal Article

We provide a validation of a formal approximate solution to the problem of the evolution of a slowly varying harvested logistic population. Using a contraction mapping proof, we show that the initial value problem for the population has an exact solution lying in an appropriately small neighbourhood of this approximate solution, under quite general conditions.

Majda A. Idlango, (01-2015), Communications in Nonlinear Science and Numerical Simulation: ELSEVIER, 26 (3), 36-44

ON FEKETE-SZEGO PROBLEMS FOR CERTAIN SUBCLASS OF ANALYTIC FUNCTIONS
Conference paper

The aim of this paper is to determine the Fekete-Szegö inequalities for a normalized analytic function defined on the open unit disk lies in a region starlike with respect to 1 and it is symmetric with respect to the real axis by using the operator given recently by the authors. As a special case of this result, Fekete-Szegö inequality for a class of functions defined by fractional derivatives is also obtained.

 

E. EL-Yagubi, (12-2014), TURKISH: Journal of Quality Measurement and Analysis, 17-26

Comparative analysis of steganographic algorithms within compressed video domain
Conference paper

Steganographic techniques with varying degrees of embedding capacity, perceptual transparency, and security are presented. These techniques have been developed to protect privileged or confidential information restricted to public access and to replace cryptography methods. In this study, three embedding algorithms, namely, least significant bit insertion, bit-plane complexity segmentation, and enhanced version of pixel value difference (EPVD) were implemented and analyzed in terms of the main steganography issues (payload, invisibility, and security) using a different proper performance metrics. This study was motivated by the minimal research focus accorded to hiding data in compression domain for the class of video-based embedding methods. Therefore, analyzing steganographic algorithms is generally based on hiding information in the quantized AC-Coefficients of the frames during the MPEG-2 compression process. Simulation results reveal that EPVD provides better embedded payload and acceptable visual quality, but lower PSNR value.

Tarik Faraj Idbeaa, (12-2014), 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS): IEEE, 1-7

Problems facing english university students in paragraph writing
Journal Article

Most students do not know how to compose a good piece of writing

Ali Ahmed Rahima Rahima, (12-2014), جمعية جبل نفوسة للتنمية: مجلة صدى المعرفة, 2 (1), 1-25

مشكلات الرياضة المدرسية بمدارس التعليم الأساسي والمتوسط ببلدية الأصابعة
مقال في مجلة علمية

0

عبدالكريم ابراهيم على الطوير، (12-2014)، مجلة كلية التربية البدنية وعلوم الرياضة جامعة طرابلس: مجلة كلية التربية البدنية وعلوم الرياضة جامعة طرابلس، 21 (21)، 89-102

Some properties on a class of harmonic univalent functions defined by differential operator
Conference paper

Using a generalized derivative operator, we introduce and study a new class of harmonic univalent functions. In the present paper, we investigate some results for functions f belong to this class which include the necessary and sufficient coefficient bounds. Growth bounds and a closure property are also obtained.

Entisar EL-Yagubi, (09-2014), -: AIP Conference Proceedings, 864-870

© جميع الحقوق محفوظة لجامعة غريان