Scientific Published Papers: Recent submissions

  • Adm, Mohammad; Garloff, Juergen (Linear and Multilinear Algebra, 2016)
    We consider classes of n-by-n sign regular matrices, i.e. of matrices with the property that all their minors of fixed order k have one specified sign or are allowed also to vanish, k = 1,..., n. If the sign is nonpositive ...
  • Adm, Mohammad; Garloff, Juergen (In: A Panorama of Mathematics: Pure and Applied, Contemporary Mathematics, vol. 658, Amer. Math. Soc.,, 2016)
    A totally positive matrix is a matrix having all its minors positive. The largest amount by which the single entries of such a matrix can be perturbed without losing the property of total positivity is given. Also some ...
  • Adm, Mohammad; Garloff, Juergen; Titi, Jihad (Reliable Computing, 2016)
    This paper considers intervals of real matrices with respect to partial orders and the problem to infer from some exposed matrices lying on the boundary of such an interval that all real matrices taken from the interval ...
  • Adm, Mohammad; Garloff, Juergen; Titi, Jihad (Journal of Mathematical Analysis and Applications, 2016)
    In this paper totally nonnegative (positive) matrices are considered which are matrices having all their minors nonnegative (positive); the almost totally positive matrices form a class between the totally nonnegative ...
  • Adm, Mohammad; Garloff, Juergen (Electronic Journal of Linear Algebra, 2014)
    Totally nonnegative matrices, i.e., matrices having all minors nonnegative, are considered. A condensed form of the Cauchon algorithm which has been proposed for finding a parameterization of the set of these matrices with ...
  • Adm, Mohammad; Garloff, Juergen (Linear Algebra and its Applications, 2013)
    Totally nonnegative matrices, i.e., matrices having all their minors nonnegative, and matrix intervals with respect to the checkerboard ordering are considered. It is proven that if the two bound matrices of such a matrix ...
  • Adm, Mohammad; Garloff, Juergen (Operators and Matrices, 2014-03-01)
    Tridiagonal matrices are considered which are totally nonnegative, i. e., all their minors are nonnegative. The largest amount is given by which the single entries of such a matrix can be perturbed without losing the ...
  • Fawaz, Zeinab; El Assad, Safwan; Farajallah, Mousa; Ayman, Khalil; Lozi, René; Déforges, Olivier (8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013-12-09)
    In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a ...
  • Karama, Muneer Jebreel (2003)
    The aim of this article is to develop the issue of operation sense of fractions through the conditions in real-world for the students in 7th grade, so this advancing students’ mathematical thinking in every day mathematics ...
  • Abutaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011-06-01)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • Chetto, Maryline; Noura, Hassan; El Assad, Safwan; Farajallah, Mousa (2012 International Conference for Internet Technology and Secured Transactions, 2012-12-20)
    Abstract: A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This ...
  • Chetto, Maryline; El Assad, Safwan; Farajallah, Mousa (International Journal of Internet Technology and Secured Transactions, 2014-01-01)
    A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This issue has a ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-14)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • El Assad, Safwan; Farajallah, Mousa; Vladeanu, Calin (The 10th International Conference on Communications (COMM), 2014-05-29)
    A variety of chaos-based cryptosystems have been investigated during the last decade. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by ...
  • Karama, Muneer Jebreel (2013)
    هدفت الدراسة إلى إبراز دور الإعلام في تحسين نوعية التعليم والتعلّم من خلال أنشطة ابتكارية مقترحة، وقد تمثلت مشكلة الدراسة في الإجابة عن الأسئلة :ما الأنشطة الإعلامية المقترحة والتي تحسن من نوعية التعليم والتعلم؟ وما المتطلبات ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan; Odeh, Mohammad (International Journal of Computer Science and Security (IJCSS), 2011-06-02)
    Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications ...
  • Farajallah, Mousa; Fawaz, Zeinab; El Assad, Safwan; Deforges, Olivier (The 7th International Conference on Emerging Security Information, Systems and Technologies, 2013-08-25)
    Many image encryption algorithms based on chaos have been proposed since 1989. Most of them are slow and use a secret key of encryption/decryption independent of the plain image. We introduce a new fast and secure image ...
  • Farajallah, Mousa (UNIVERSITE DE NANTES, 2015-06-30)
    The security of image and video data is important for many applications which require in real-time a high security level. In the first part of this work, four chaos-based cryptosystems, flexible, efficient, and more robust ...

Search DSpace


Browse

My Account