Skip to main content

Showing 1–22 of 22 results for author: Zaidan, A

.
  1. arXiv:2201.03391  [pdf

    cs.CR

    Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard

    Authors: Mohamed Abomhara, Omar Zakaria, Othman O. Khalifa, A. A Zaidan, B. B Zaidan

    Abstract: Multimedia information availability has increased dramatically with the advent of mobile devices. but with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, an… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

  2. Classification of linear operators satisfying $(Au,v)=(u,A^rv)$ or $(Au,A^rv)=(u,v)$ on a vector space with indefinite scalar product

    Authors: Victor Senoguchi Borges, Iryna Kashuba, Vladimir V. Sergeichuk, Eduardo Ventilari Sodré, André Zaidan

    Abstract: We classify all linear operators $A:V\to V$ satisfying $(Au,v)=(u,A^rv)$ and all linear operators satisfying $(Au,A^rv)=(u,v)$ with $r=2,3,\dots$ on a complex, real, or quaternion vector space with scalar product given by a nonsingular symmetric, skew-symmetric, Hermitian, or skew-Hermitian form.

    Submitted 7 December, 2020; originally announced December 2020.

    MSC Class: 15A21; 15A63; 15B57; 46C20; 47B50

    Journal ref: Linear Algebra Appl. 611 (2021) 118-134

  3. arXiv:2012.01221  [pdf

    cond-mat.mtrl-sci cond-mat.str-el

    Strain-induced anion ordering in perovskite oxyfluoride films

    Authors: Jiayi Wang, Yong** Shin, Jay R. Paudel, Joseph D. Grassi, Raj K. Sah, Weibing Yang, Evguenia Karapetrova, Abdulhadi Zaidan, Vladimir N. Strocov, Christoph Klewe, Padraic Shafer, Alexander X. Gray, James M. Rondinelli, Steven J. May

    Abstract: Anionic ordering is a promising route to engineer physical properties in functional heteroanionic materials. A central challenge in the study of anion-ordered compounds lies in develo** robust synthetic strategies to control anion occupation and in understanding the resultant implications for electronic structure. Here, we show that epitaxial strain induces preferential occupation of F and O on… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

  4. arXiv:2006.13119  [pdf, other

    cond-mat.str-el cond-mat.mtrl-sci cond-mat.supr-con

    Oxide Fermi liquid universality revealed by electron spectroscopy

    Authors: M. Horio, K. P. Kramer, Q. Wang, A. Zaidan, K. von Arx, D. Sutter, C. E. Matt, Y. Sassa, N. C. Plumb, M. Shi, A. Hanff, S. K. Mahatha, H. Bentmann, F. Reinert, S. Rohlf, F. K. Diekmann, J. Buck, M. Kalläne, K. Rossnagel, E. Rienks, V. Granata, R. Fittipaldi, A. Vecchione, T. Ohgi, T. Kawamata , et al. (5 additional authors not shown)

    Abstract: We present a combined soft x-ray and high-resolution vacuum-ultraviolet angle-resolved photoemission spectroscopy study of the electron-overdoped cuprate Pr$_{1.3-x}$La$_{0.7}$Ce$_{x}$CuO$_4$ (PLCCO). Demonstration of its highly two-dimensional band structure enabled precise determination of the in-plane self-energy dominated by electron-electron scattering. Through analysis of this self-energy an… ▽ More

    Submitted 25 December, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Journal ref: Phys. Rev. B 102, 245153 (2020)

  5. arXiv:1903.02626  [pdf, ps, other

    math.RT

    Gauge modules for the Lie algebras of vector fields on affine varieties

    Authors: Yuly Billig, Jonathan Nilsson, André Zaidan

    Abstract: For a smooth irreducible affine algebraic variety we study a class of gauge modules admitting compatible actions of both the algebra $A$ of functions and the Lie algebra $\mathcal{V}$ of vector fields on the variety. We prove that a gauge module corresponding to a simple $\mathfrak{gl}_N$-module is irreducible as a module over the Lie algebra of vector fields unless it appears in the de Rham compl… ▽ More

    Submitted 6 March, 2019; originally announced March 2019.

    MSC Class: 17B10

  6. Classification of linear map**s between indefinite inner product spaces

    Authors: Juan Meleiro, Vladimir V. Sergeichuk, Thiago Solovera, Andre Zaidan

    Abstract: Let $\mathcal A:U\to V$ be a linear map** between vector spaces $U$ and $V$ over a field or skew field $\mathbb F$ with symmetric, or skew-symmetric, or Hermitian forms $\mathcal B:U\times U\to\mathbb F$ and $\mathcal C:V\times V\to\mathbb F.$ We classify the triples $(\mathcal A,\mathcal B,\mathcal C)$ if $\mathbb F$ is $\mathbb R$, or $\mathbb C$, or the skew field of quaternions $\mathbb H$.… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Comments: 21 pages

    MSC Class: 11E39; 15A21; 15A63; 46C20

    Journal ref: Linear Algebra Appl. 531 (2017) 356-374

  7. arXiv:1006.4565  [pdf

    cs.SE

    An Overview: Extensible Markup Language Technology

    Authors: Rami Alnaqeib, Fahad H. Alshammari, M. A. Zaidan, A. A. Zaidan, B. B. Zaidan, Zubaidah M. Hazza

    Abstract: XML stands for the Extensible Markup Language. It is a markup language for documents, Nowadays XML is a tool to develop and likely to become a much more common tool for sharing data and store. XML can communicate structured information to other users. In other words, if a group of users agree to implement the same kinds of tags to describe a certain kind of information, XML applications can assist… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Comments: IEEE Publication Format, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617

  8. arXiv:1006.4559  [pdf

    cs.OH

    Analytical Study on Internet Banking System

    Authors: Fadhel. S. AlAbdullah, Fahad H. Alshammari, Rami Alnaqeib, Hamid A. Jalab, A. A. Zaidan, B. B. Zaidan

    Abstract: The Internet era is a period in the information age in which communication and commerce via the Internet became a central focus for businesses, consumers, government, and the media. The Internet era also marks the convergence of the computer and communications industries and their associated services and products. Nowadays, the availability of the Internet make it widely used for everyday life. In… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Comments: IEEE Publication Format, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617

  9. arXiv:1006.4547  [pdf

    cs.DL

    New Quantitative Study for Dissertations Repository System

    Authors: Fahad H. Alshammari, Rami Alnaqeib, M. A. Zaidan, Ali K. Hmood, B. B. Zaidan, A. A. Zaidan

    Abstract: In the age of technology, the information communication technology becomes very important especially in education field. Students must be allowed to learn anytime, anywhere and at their own place. The facility of library in the university should be developed. In this paper we are going to present new Quantitative Study for Dissertations Repository System and also recommend future application of th… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Comments: IEEE Publication Format, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617

  10. arXiv:1006.2809  [pdf

    cs.CL

    Offline Arabic Handwriting Recognition Using Artificial Neural Network

    Authors: A. A Zaidan, B. B Zaidan, Hamid. A. Jalab, Hamdan. O. Alanazi, Rami Alnaqeib

    Abstract: The ambition of a character recognition system is to transform a text document typed on paper into a digital format that can be manipulated by word processor software Unlike other languages, Arabic has unique features, while other language doesn't have, from this language these are seven or eight language such as ordo, jewie and Persian writing, Arabic has twenty eight letters, each of which can b… ▽ More

    Submitted 14 June, 2010; originally announced June 2010.

    Comments: Submitted to Journal of Computer Science and Engineering, see http://sites.google.com/site/jcseuk/volume-1-issue-1-may-2010

    Journal ref: Journal of Computer Science and Engineering, Volume 1, Issue 1, p55-58, May 2010

  11. arXiv:1005.4029  [pdf

    cs.OH

    On the Module of Internet Banking System

    Authors: Hamdan. O. Alanazi, Rami Alnaqeib, Ali K. Hmood, M. A. Zaidan, Yahya Al-Nabhani

    Abstract: Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days.… ▽ More

    Submitted 21 May, 2010; originally announced May 2010.

    Comments: http://www.journalofcomputing.org

    Journal ref: Journal of Computing, Volume 2, Issue 5, May 2010

  12. arXiv:1005.4028  [pdf

    cs.HC

    Internet Banking System Prototype

    Authors: Rami Alnaqeib, Hamdan. O. Alanazi, Hamid. A. Jalab, M. A. Zaidan, Ali K. Hmood

    Abstract: Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained thr… ▽ More

    Submitted 21 May, 2010; originally announced May 2010.

    Comments: http://www.journalofcomputing.org

    Journal ref: Journal of Computing, Volume 2, Issue 5, May 2010

  13. arXiv:1005.4026  [pdf

    cs.DL

    Dissertations Repository System Using Context Module

    Authors: Ali K. Hmood, M. A. Zaidan, Hamdan. O. Alanazi, Rami Alnaqeib, Yahya Al-Nabhani

    Abstract: Without a doubt, the electronic learning makes education quite flexible. Nowadays, all organizations and institutions are trying to avoid Monotony and the delay and inertia. As well the universities should be improving their systems continually to achieve success. Whereas, the students need to access the dissertations in the library. In this paper we will present Dissertations Repository System Us… ▽ More

    Submitted 21 May, 2010; originally announced May 2010.

    Comments: http://www.journalofcomputing.org

    Journal ref: Journal of Computing, Volume 2, Issue 5, May 2010

  14. arXiv:1003.4086  [pdf

    cs.CR cs.MM

    Overview: Main Fundamentals for Steganography

    Authors: Zaidoon Kh. AL-Ani, A. A. Zaidan, B. B. Zaidan, Hamdan. O. Alanazi

    Abstract: The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the signi… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/

  15. arXiv:1003.4085  [pdf

    cs.CR

    New Comparative Study Between DES, 3DES and AES within Nine Factors

    Authors: Hamdan. O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid A. Jalab, M. Shabbir, Y. Al-Nabhani

    Abstract: With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/

  16. arXiv:1003.4084  [pdf

    cs.MM cs.CR

    New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files

    Authors: Hamdan. O. Alanazi, A. A. Zaidan, B. B. Zaidan, Hamid A. Jalab, Zaidoon Kh. AL-Ani

    Abstract: With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document a… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010

  17. arXiv:1002.4049  [pdf

    cs.MM cs.CR

    Optimization Digital Image Watermarking Technique for Patent Protection

    Authors: Mahmoud Elnajjar, A. A Zaidan, B. B Zaidan, Mohamed Elhadi M. Sharif, Hamdan. O. Alanazi

    Abstract: The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue. Another problem with digital document and video is that undetectable m… ▽ More

    Submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/

  18. arXiv:1002.4047  [pdf

    cs.CR

    Intrusion Detection System: Overview

    Authors: Hamdan. O. Alanazi, Rafidah Md Noor, B. B Zaidan, A. A Zaidan

    Abstract: Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lear… ▽ More

    Submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/

  19. arXiv:1002.2416  [pdf

    cs.CR cs.MM

    New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques

    Authors: Rafiqul Islam, A. W. Naji, A. A. Zaidan, B. B. Zaidan

    Abstract: A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillan… ▽ More

    Submitted 11 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 273-279, January 2010, USA

  20. arXiv:1001.3502  [pdf

    cs.CV

    3D Skull Recognition Using 3D Matching Technique

    Authors: Hamdan. O. Alanazi, B. B Zaidan, A. A Zaidan

    Abstract: Biometrics has become a "hot" area. Governments are funding research programs focused on biometrics. In this paper the problem of person recognition and verification based on a different biometric application has been addressed. The system is based on the 3DSkull recognition using 3D matching technique, in fact this paper present several bio-metric approaches in order of assign the weak point in… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Journal ref: Journal of Computing, Vol. 2, Issue 1, January 2010

  21. arXiv:0912.3986  [pdf

    cs.CR

    Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation

    Authors: Hamid. A. Jalab, A. A Zaidan, B. B Zaidan

    Abstract: Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image's bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for sel… ▽ More

    Submitted 20 December, 2009; originally announced December 2009.

    Journal ref: Journal of Computing, Volume 1, Issue 1, pp 108-113, December 2009

  22. arXiv:0908.0216  [pdf

    cs.CR

    Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    Authors: A. W. Naji, Shihab A. Hameed, B. B. Zaidan, Wajdi F. Al-Khateeb, Othman O. Khalifa, A. A. Zaidan, Teddy S. Gunawan

    Abstract: The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the infor… ▽ More

    Submitted 3 August, 2009; originally announced August 2009.

    Comments: 6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA