Volume 11 Issue 1

Published: 2014-06-15

Contents


Research Paper
Using DNA to Encode Text Files

Yassin H. Ismail, Najla B. Ibrahim

Modern studies focused on Deoxyribonucleic acid (DNA) because that DNA have several important features including the random nature of the sequence of nitrogenous bases consisting the acid and large...

DOI: 10.33899/csmj.2014.163736

Pages: 13-23
On SNF-rings , I

Raida D. Mahmood, Akram S. M.

A ring is called right SNF-rings if every simple right R-module is N-flat . In this paper , we give some conditions which are sufficient or equivalent for a right SNF-ring to be n-regular (reduced)...

DOI: 10.33899/csmj.2014.163727

Pages: 13-18
Classification of Zero Divisor Graphs of Commutative Rings of Degrees 11,12 and 13

Nazar H. Shuker, Husam Q. Mohammad

In 2005 Wang investigated the zero divisor graphs of degrees 5,6,9 and 10. In 2012 Shuker and Mohammad investigated the zero divisor graphs of degrees 7 and 8. In this paper, we consider zero...

DOI: 10.33899/csmj.2014.163728

Pages: 19-24
A Modified Class of Conjugate Gradient Algorithms Based on Quadratic Model for Nonlinear Unconstrained Optimization

Basim A. Hassan, Hameed M. Sadiq

In this paper, we have investigated a new class of conjugate gradient algorithms for unconstrained non-linear optimization which are based on the quadratic model. Some theoretical results are...

DOI: 10.33899/csmj.2014.163729

Pages: 25-37
Hybridization of a hidden Markov model using Elman neural network with application

Omar Saber Qasim

This research aims to improve the performance of the work of hidden Markov model, which is limited to the positive integers as input, and through the use of Elman artificial neural network that...

DOI: 10.33899/csmj.2014.163737

Pages: 25-42
Conjugate Gradient Algorithm Based on Aitken's Process for Training Neural Networks

Khalil K. Abbo, Hind H. Mohammed

Conjugate gradient methods constitute excellent neural network training methods, because of their simplicity, numerical efficiency and their very low memory requirements. It is well-known that the...

DOI: 10.33899/csmj.2014.163730

Pages: 39-51
Incomplete (rq-q+r- ɛ , r)-arcs and minimal {ℓ,t}-Blocking set in PG(2,q)

Nada Yassen Kasm Yahya, Hiba suhil najem

We proved that(rq-q+r-,r)-arcs is incomplete by using minimal {,t}-Blocking set in projective plane PG(2,q)and we found a new condition for is -A(r-1)2+B(r-1)-C and A,B,C is a constant which is...

DOI: 10.33899/csmj.2014.163738

Pages: 43-60
Measuring Of Data Base Performance Using Oracle

Heba Abdul-Razzak Raoof, Firas Mahmoud Mustafa

Due to the tremendous increase in the manufacturing of computer and producing high speed and performance computers, it was very important to find new methods for distinguishing its efficiency,...

DOI: 10.33899/csmj.2014.163731

Pages: 53-67
Building an electronic documentation system for the Graduate Studies Division using Distributed databases

Nather Muhammad Qiddo, Raed A. H. Al-Dabbagh

This research aims to build a system for electronic documentation for the unit of graduate studies, which is used for managing electronic documents (official books, attachments, and instructions)....

DOI: 10.33899/csmj.2014.163739

Pages: 61-80
Numerical Solution of Allen – Cahn Equation by Adomian Decomposition Method

Abdulghafor M. Al-Rozbayani

In this paper, Adomian Decomposition Method with Adomian polynomials are applied to solve Allen - Cahn equation with the initial condition only, also DuFort-Frankel method is applied with the...

DOI: 10.33899/csmj.2014.163732

Pages: 69-79
Application of Chaotic Neural Network for Authentication using the Database

Ammar Thaher Yaseen Abd Alazeez

In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding by entering values to...

DOI: 10.33899/csmj.2014.163740

Pages: 81-95
Studying the Stability of a Non-linear Autoregressive Model (Polynomial with Hyperbolic Cosine Function)

Abdulghafoor Gasim Salim, Anas Salim Youns Abdullah

In this paper we study the statistical properties of one of a non-linear autoregressive model with hyperbolic triangle function(polynomial with hyperbolic cosinefunction)by using the local...

DOI: 10.33899/csmj.2014.163733

Pages: 81-91
On Local Rings

Zubayda M. Ibraheem, Anees A. Fthee

A ring R is called local ring if it has exactly one maximal ideal. In this paper, we introduce some characterization and basic properties of this ring. Also, we studied the relation between local...

DOI: 10.33899/csmj.2014.163759

Pages: 93-97
Textures Recognition using Elman Neural Network

Fawziya Mahmood Ramo, Alaa Anwr Mohamed

In this research building system to recognition texture images using artificial neural networks. The system consists of two phases: phase extraction important feature of each texture by using an...

DOI: 10.33899/csmj.2014.163741

Pages: 97-108
Image Clustering based on Artificial Intelligence Techniques

Baydaa Ibraheem Khaleel

Clustering has been widely used in data analysis and pattern recognition and classification. The objective of cluster analysis is the classification of objects according to similarities among them,...

DOI: 10.33899/csmj.2014.163735

Pages: 99-112
Architecture Design of 2-D Discrete Wavelet Transformation Algorithm using Field Programmable Gate Array (FPGA)

Maha A. Hasso, Sahla A. Ali

In this paper an architecture has been proposed for the 2-D Discrete Wavelet Transform (DWT) and the Inverse Discrete Wavelet Transform (IDWT) based on the Convolution method of the Daubechies...

DOI: 10.33899/csmj.2014.163742

Pages: 109-123
Isolated Arabic Digit Recognition Using Genetic Algorithm

Yusra Faisal Al-Irhaim, Ali Insaf Jasim

This study aims at constructing an intelligent system for recognizing the single Arabic numbers. It consists of two basic stages: the stage of features extraction and the stage of recognition. In...

DOI: 10.33899/csmj.2014.163743

Pages: 125-142
Distinguish of Fingerprint Based on Artificial Neural Networks

Zahraa Maen Al-Qattanz

In this research use one of artificial intelligence techniques which is artificial neural networks was used to distinguish fingerprint from a range of fingerprints belong to a unified database,...

DOI: 10.33899/csmj.2014.163744

Pages: 143-162
The Basis Number of symmetric Difference of K2 With Some Special Graphs

Ghassan Toubia Marougi, Ahmed Mohammed Ali, Rasha Sallal Hasan

This research aims to account the basis number of symmetric difference of K2 with some special graphs such as a saw graph, a cog graphs, a fan graph and a wheel graph.

DOI: 10.33899/csmj.2014.163745

Pages: 163-177
Selection and Prioritization of Test Cases by using Bees Colony

Shahbaa I. Khaleel, Ragad waleed khaled

In this research, the bees swarm intelligence was studied to appointment it to serve software engineering. And that was performed through using Artificial Bees Colony ABC Algorithm in selection of...

DOI: 10.33899/csmj.2014.163746

Pages: 179-201