Volume 6 Issue 2

Published: 2009-06-05

Contents


Research Paper
Using the Improvement of the Fixed Point Iterative Method in Solving Fredholm Integral Equations

Abbas Y. Al-Bayati

In this paper an iterative method for the fixed point is used to obtain an approximation solution for the Fredholm integral equations of the second kind by using several problems with different...

DOI: 10.33899/csmj.2009.163792

Pages: 11-19
Using the Update of Conditional BFGS in Constrained Optimization

Abbas Y. Al-Bayati, Ban Ahmed Mitras

In this paper, we have used one of the preconditioned conjugate gradient algorithm with the Quasi Newton approximation; namely the BFGS preconditioned algorithm which was suggested by (AL-Bayati...

DOI: 10.33899/csmj.2009.163812

Pages: 11-20
On New Conjugate Pair Method

Abbas Y. Al-Bayati, Nidhal Al-Assady, Ban Ahmed Mitras

This paper involves the combination between the conjugate pair and hybrid conjugate gradient methods. The new combined algorithm is based on exact line search and it is examined by using different...

DOI: 10.33899/csmj.2009.163793

Pages: 21-29
Stability Analysis of Convection & Diffusion equation

Saad Abdullah Manna, Badran Jassim Salem

The Stability Analysis of Convection& Diffusion equation by using Fourier mode Stability analysis in two cases has been considered , the first one when the amplitude is constant and the second...

DOI: 10.33899/csmj.2009.163813

Pages: 21-31
PILP-rings and fuzzy ideals

Raida D. Mahmood

In this paper, we study rings whose principal right ideals are left pure. Also we shall introduce the concept of a fuzzy bi-ideal in a ring, and give some properties of such fuzzy ideals. We also...

DOI: 10.33899/csmj.2009.163794

Pages: 31-37
Discrimination Features by Wavelet Transformation

Faten A. Mustafa, Turkan A. Khalil, Almas A. Khalil

Recently, techniques and applications in space data processing it's and study characteristics in different areas and applications such as remote sensing study of land use, land cover and geological...

DOI: 10.33899/csmj.2009.163814

Pages: 33-46
A Generalized Curvature of a Generalized Envelope

Tahir H. Ismail, Ibrahim O. Hamad

In this paper we study one of the applications of a generalized curvature [3] on the generalized envelope of a family of lines given in [7], [8], using some concepts of nonstandard analysis given...

DOI: 10.33899/csmj.2009.163795

Pages: 39-47
Remove Noise from Grayscale Digital Images by Traditional and Fuzzy Filters

Baydaa I. Khalil

Image denoising and enhancement is an important field and it is used very much in image processing, where images are corrupted by many kinds of noise, therefore, methods and techniques must be used...

DOI: 10.33899/csmj.2009.163815

Pages: 47-100
Dynamic Programming Algorithms for Solving Single Machine Scheduling Problems with a Fixed Complexity Time

Kawa A. Al-Qazilchy

We solvein this paper some machine scheduling problems with certain conditions; the solution had been made by using dynamic programming procedures with a fixed time for all the algorithms. Some of...

DOI: 10.33899/csmj.2009.163796

Pages: 49-59
Numerical Solution and Stability Analysis for Burger's-Huxley Equation

Saad A. Manaa, Farhad M. Saleem

The Burgers-Huxley equation has been solved numerically by using two finite difference methods, the explicit scheme and the Crank-Nicholson scheme. A comparison between the two schemes has been...

DOI: 10.33899/csmj.2009.163797

Pages: 61-75
On Representation Theorem for Algebras with Three Commuting Involutions

Amir A. Mohammed, Baida S. Abdullah, Nadwa S. Younis

Algebras with three commuting involutions are represented as commutants of one-generated subalgebras of algebras of vector-space endomorphisms where and are involutions of a prefixed type.

DOI: 10.33899/csmj.2009.163798

Pages: 77-84
Hosoya Polynomials of Steiner Distance of the Sequential Join of Graphs

Herish O. Abdullah

The Hosoya polynomials of Steiner n-distance of the sequential join of graphs and are obtained and the Hosoya polynomials of Steiner 3-distance of the sequential join of m graphs are also obtained.

DOI: 10.33899/csmj.2009.163799

Pages: 85-95
Detection of Face Direction by Implementing Face Edge Patterns

Jarjees A. Khidir

In this paper, a method for detecting the direction of a human face is developed; regardless of its age or sex. The method involves creating a set of five face patterns representing the front, up,...

DOI: 10.33899/csmj.2009.163800

Pages: 97-104
Flow Stability Analysis of the Shallow Water Equations Model

Ashraf S. Aboudi

This paper is devoted to analyze the stability of shallow water of a system of equations that was exposed to disturbancing. This analysis is done by finding the eigenvalues of the system which...

DOI: 10.33899/csmj.2009.163816

Pages: 101-118
Iris Recognition System Based on Wavelet Transform

Maha A. Hasso, Bayez K. Al-Sulaifanie, Kaydar M. Quboa

In order to provide accurate recognition of individuals, the most discriminating information present in an iris pattern must be extracted. Only the significant features of the iris must be encoded...

DOI: 10.33899/csmj.2009.163801

Pages: 105-116
The n-Wiener Polynomials of the Cartesian Product of a Complete Graph with some Special Graphs

Ali Aziz Ali, Haveen G. Ahmed

The n-Wiener polynomials of the Cartesian products of a complete graph Kt with another complete graph Kr, a star graph Sr, a complete bipartite graph Kr,s, a wheel Wr, and a path graph Pr are...

DOI: 10.33899/csmj.2009.163802

Pages: 117-128
Joint Numerical Range of Matrix Polynomials

Ahmed M. Sabir

Some algebraic properties of the sharp points of the joint numerical range of a matrix polynomials are the main subject of this paper. We also consider isolated points of the joint numerical range...

DOI: 10.33899/csmj.2009.163803

Pages: 129-136
Efficient Genetic Algorithms for Arabic Handwritten Characters Recognition

Laheeb Mohammad Ibrahim

The main challenge in Arabic handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects in a short period of time high...

DOI: 10.33899/csmj.2009.163804

Pages: 137-157
A Hybrid Ant Colony Optimization Algorithm to Solve Assignment Problem by Hungarian Method

Isra N. Alkallak

This research studied ant colony optimization with optimization problem as an assignment model problem by Hungarian method. The proposed heuristic algorithm simulate ant colony optimization...

DOI: 10.33899/csmj.2009.163805

Pages: 159-175
Linear Codes Arise From New Complete (n,r)-arcs in PG(2,29)

Shuaa Aziz

This paper presents the recently-discovered linear [n,3,d] codes over PG(2,29) that arises from a complete (n,r)-arcs which the paper[12] presented it for the first time. The aim of this paper is...

DOI: 10.33899/csmj.2009.163806

Pages: 177-184
Cryptanalysis Knapsack Cipher Using Artificial Immune System

Eman Th. Al-Obaidy

In this work, the use of an artificial immune system (AIS ) in cryptanalysis is explored. This AIS uses the clonal selection principle for the cryptanalysis of knapsack cipher. Results showed that...

DOI: 10.33899/csmj.2009.163807

Pages: 185-195
A Generalization of Von Neumann Regular Rings

Adil K. Jabbar

In this paper, we introduce a new ring which is a generalization of Von Neumann regular rings and we call it a centrally regular ring. Several properties of this ring are proved and we have...

DOI: 10.33899/csmj.2009.163808

Pages: 197-210
Face Recognition using Artificial Intelligent Techniques

Laheeb Mohammad Ibrahim, Ibrahim A. Saleh

Face recognition is considered one of the visual tasks which humans can do almost effortlessly while for computers it is a difficult and challenging task. This research deals with the problem of...

DOI: 10.33899/csmj.2009.163809

Pages: 211-227
Artificial Intelligent Techniques with Watermarking

Nada N. Saleem, Baydaa I. Khaleel, Shahbaa I. Khaleel

This research presents three robust blind watermarking algorithms in the discrete wavelet transform and spatial domain based on neural network and fuzzy logic artificial intelligent techniques. To...

DOI: 10.33899/csmj.2009.163810

Pages: 229-266