Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Neamah, Ammar Ali"'
Autor:
Neamah, Ammar Ali
$CMO$ functions are completely multiplicative functions $f$ for which $\sum_{n=1}^\infty f(n)$ $=0$. These functions were first introduced and studied by Kahane and Sa\"{i}as [5]. The main purpose of this paper is to generalise such functions to mult
Externí odkaz:
http://arxiv.org/abs/2108.11937
Autor:
Neamah, Ammar Ali, Hilberdink, Titus W
Publikováno v:
International Journal of Number Theory, 2019
In this paper, we study the counting functions $\psi_\mathcal{P}(x)$, $N_\mathcal{P}(x)$ and $M_\mathcal{P}(x)$ of a generalized prime system $\mathcal{N}$. Here $M_\mathcal{P}(x)$ is the partial sum of the M\"{o}bius function over $\mathcal{N}$ not
Externí odkaz:
http://arxiv.org/abs/1901.06866
Autor:
Hadi Hiba Hilal, Neamah Ammar Ali
Publikováno v:
Open Engineering, Vol 14, Iss 1, Pp 127291-20 (2024)
Digital image protection is crucial since images often contain private and sensitive information in business, medical, and military. One of the best techniques for securing the content of these images is encryption. This article introduces a cryptosy
Externí odkaz:
https://doaj.org/article/2217d0739ec445c89ca77f8b84be4179
Autor:
Neamah, Ammar Ali1,2 (AUTHOR) ammara.meamah@uokufa.edu.iq
Publikováno v:
Bulletin of the Iranian Mathematical Society. Dec2023, Vol. 49 Issue 6, p1-16. 16p.
Autor:
Neamah, Ammar Ali1 (AUTHOR), Shukur, Ali A.1 (AUTHOR) shukur.math@gmail.com
Publikováno v:
Symmetry (20738994). Aug2023, Vol. 15 Issue 8, p1511. 22p.
Autor:
Neamah, Ammar Ali
It is true that different approaches have been utilised to accelerate the computation of discrete logarithm problem on elliptic curves with Pollard's Rho method. However, trapping in cycles fruitless will be obtained by using the random walks with Po
Externí odkaz:
http://arxiv.org/abs/1607.05901
Autor:
Hadi , Hiba Hilal, Neamah, Ammar Ali
Publikováno v:
International Journal of Intelligent Systems and Applications in Engineering; Vol. 11 No. 5s (2023): Special Issue on Applications of Advanced Engineering Technologies; 353-360
Various techniques were used to improve and propose cryptographic systems based on elliptic curves. In particular, the Diffie-Hellman key exchange protocol is widely used in most of these systems. In this work, we introduce an efficient approach base
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Neamah, Ammar Ali
CMO functions multiplicative functions f for which ∑n=1∞f(n)=0. Such functions were first defined and studied by Kahane and Saïas [14]. We generalised these to Beurling prime systems with the aim to investigate the theory of the extended functio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=core_ac_uk__::30cd59fa2609a6d75caab20fa92390ef
https://centaur.reading.ac.uk/94202/1/40993_2020_Article_215.pdf
https://centaur.reading.ac.uk/94202/1/40993_2020_Article_215.pdf
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.