Volume 4 Issue 2

Published: 2007-12-03

Contents


Article
Investigation on Scaled CG-Type Algorithms for Unconstrained Optimization

Abbas Y. Al-Bayati, Khalil K. Abo, Salah G. Shareef

In this paper, we describe two new algorithms which are modifications of the Hestens-stiefl CG-method. The first is the scaled CG-method (obtained from function and gradient-values) which improves...

DOI: 10.33899/csmj.2007.164012

Pages: 11-23
Research Paper
Stability Analysis of Steady State Solutions of Sine–Gordon Equation

Saad Abdullah Manna, Norjan Hasan Juma

The stability analysis of steady state solutions of SineGordon equation using Fourier mode stability analysis in two cases has been considered : Firstly when the amplitude is constant and secondly...

DOI: 10.33899/csmj.2007.164024

Pages: 11-29
sπ-Weakly Regular Rings

Raida D. Mahmood, Abdullah M. Abdul-Jabbar

The purpose of this paper is to study a new class of rings R in which, for each a R, a aR aR, for some positive integer n. Such rings are called sp-weakly regular rings and give some of their...

DOI: 10.33899/csmj.2007.164013

Pages: 25-32
Wiener Polynomials for Multi-Rings Paraffin Structures

Ahmed M. Ali

The distance between any two vertices u and v in a connected graph G is defined as the length of the shortest path between them, and it is denoted by d(u,v).The sum of distances for all unordered...

DOI: 10.33899/csmj.2007.164025

Pages: 31-40
Weighted Points and Lines in Projective Plane of order 17

Ban A. Qassim, Makbola J. Mohamed

In the current research ,the points and lines of the projective plane of the seventeenth (17th)order were constructed ,this was followed by examining the arcs designated (k,n;f)- in the plane type...

DOI: 10.33899/csmj.2007.164014

Pages: 33-41
Learing Visual Fox Pro Language with Audio, Video and Sharing

Turfa Y. Hamed

Recently, the need for learning programs is increased, especially after the fast propagation of computers in different areas and the essential use of computer as an assistant in learning process...

DOI: 10.33899/csmj.2007.164026

Pages: 41-61
An Implementation of an Initial Scale in Solving Binary Knapsack Problem Using a Genetic Algorithm

Abbas Y. Al-Bayati, Nawar N. Qubat

In this paper, we used a new operation in a Genetic Algorithm for solving the binary Knapsack problem depending on its LP Relaxation solution after eliminating the fractional part of the non-binary...

DOI: 10.33899/csmj.2007.164015

Pages: 43-57
Interleaving between Ant Colony Optimization and Tabu Search for Image Matching

Ghusoon S. Basheer

Image matching plays an important role in many applications such as multi-modality medical imaging and multi-spectral image analysis. The role of matching is to integrate multiple sources of object...

DOI: 10.33899/csmj.2007.164016

Pages: 59-77
Speech Compression using Wavelet Transforms

Khalil I. Al-Saif

In this research wavelet technique was used for speech compression. It was translated and scaled to groups which represent mother wavelet function. Applying the adopted algorithm with MATLAB...

DOI: 10.33899/csmj.2007.164027

Pages: 63-75
Flow of Thin Liquid Film on an Inclined Solid Surface

Khidr M.S. Khidr

In this paper, we consider flow of thin liquid film on an inclined solid surface with an inclination angle . We use the Navier-Stokes equations to obtain equations that govern such flow .We solve...

DOI: 10.33899/csmj.2007.164028

Pages: 77-86
Free Convection Flow of Viscous Dissipative Fluid in a Rectangular Cavity

Ahmed M. Jassim, Tagread H. Shuker

Free convection flow of incompressible viscous fluid with dissipation in a rectangular cavity has been studied, a finite difference technique based on ADI scheme is adopted in the solution of the...

DOI: 10.33899/csmj.2007.164017

Pages: 79-88
Copyright Protection for Text Documents

Dujan B. Taha, Farqad H. AbdulRaheem

Due to the rapid development in communication and multimedia technology, different techniques are used for copyright protection and monitoring illegal copying of these media. One of the most...

DOI: 10.33899/csmj.2007.164029

Pages: 87-101
The Numerical Range of 6 Χ 6 Irreducible Matrices

Ahmed M. Sabir

In this paper, we consider the problem of characterizing the numerical range of 6 by 6 irreducible matrices which have line segments on their boundary.

DOI: 10.33899/csmj.2007.164018

Pages: 89-98
Curtain Coating Flow of an Inclined Thin Liquid Films

Faraidun K. Hama Salh

The mechanism of thin liquid films on solid surfaces is fundamental to a wide variety of phenomena such as surface coatings in paint. A mathematical model is constructed to describe the two...

DOI: 10.33899/csmj.2007.164019

Pages: 99-111
w-Wiener Polynomials for Width Distance of Some Special Graphs

Ali A. Ali, Asma S. Aziz

Let G be a k0-connected graph ,and let ,,be the w- width, distance between the two vertices u,v in G. The w-Wiener polynomial of the width distance of G is defined by: Ww(G;x) is obtained in...

DOI: 10.33899/csmj.2007.164030

Pages: 103-124
Numerical Solution of Non-Linear Prey-Predator System using Finite Elements Method

Saad A. Manaa, Ahmed F. Qasem

A non-linear prey-predator system solved numerically by Galerkin method, and we compare these results with the results of Pius Peter Nyaanga[6] who used finite difference methods, we found that...

DOI: 10.33899/csmj.2007.164020

Pages: 113-133
Cryptanalysis of Knapsack Cipher Using Genetic Algorithm

Subhi H. Hamdon, Najlaa B. Al-Dabbagh, Milad J. Saeed

This research offers a new method in Cryptanalysis of knapsack cipher. It focuses on the application of genetic algorithm as a modern way in solving complex problems (problems have a huge numbers...

DOI: 10.33899/csmj.2007.164031

Pages: 125-136
Solving System of a Linear Fractional Differential Equations by Using Laplace Transformation

Shaker M. Rashid, Yaseen T. Mustafa

In this paper, we provide a solution to the system of non-integer differential equation of order 0 < q < 1, by the technique of Laplace transformation and with interest to property of...

DOI: 10.33899/csmj.2007.164021

Pages: 135-142
Latin Character Recognition using Neural Networks

Jamal S. Majeed, Aseel Ali, Amar S. Majeed

The aim of this work is to recognize the printed Latin's characters. In this work two methods for constructing the feature space are used. These methods are Variance and Fractal dimension methods,...

DOI: 10.33899/csmj.2007.164022

Pages: 143-155
Image Compression Based on Clustering Fuzzy Neural Network

Shahba I. Khaleel, Jamal S. Majeed, Bayda I. Khaleel

The problem inherent to any digital image is the large amount of bandwidth required for transmission or storage. This has driven the research area of image compression to develop algorithm that...

DOI: 10.33899/csmj.2007.164023

Pages: 157-174