Volume 9 Issue 1

Published: 2012-06-08

Contents


Article
Existence and Uniqueness of Solutions for Certain Nonlinear Mixed Type Integral and Integro-Differential Equations

Akram H. Mahmood, Lamyaa H . Sadoon

The aim of this paper is to study the existence, uniqueness and other properties of solutions of certain Volterra-Fredholm integral and integro differential equations. The tools employed in the...

DOI: 10.33899/csmj.2012.163680

Pages: 163-173
On Generalized Simple Singular AP-Injective Rings

Raida D. Mahmood, Husam Q. Mohammad

A ring R is said to be generalized right simple singular AP-injective, if for any maximal essential right ideal M of R and for any bM, bR/bM is AP-injective. We shall study the characterization and...

DOI: 10.33899/csmj.2012.163681

Pages: 175-180
Research Paper
Numerical solution and stability analysis of the Sine-Gordon system in two dimensions

Saad A. Manna, Haneen T. Jassim

This paper deals with the numerical solution for Sine-Gordon system in two dimensions using two finite difference methods the (ADE) and (ADI) methods .A comparison between the two methods has been...

DOI: 10.33899/csmj.2012.163684

Pages: 13-25
Explicit- Implicit Runge-Kutta Methods to Solve the System of Nonlinear PPDEs in Two Dimensions

Abbas Y. Al-Bayati, Saad Manaa, Abdulghafor M. Al-Rozbayani

In this paper, we will find the numerical solution of Gray-Scott model in two dimensions space, this method is a system of non-linear parabolic partial differential equations. Then transforming the...

DOI: 10.33899/csmj.2012.163667

Pages: 13-21
Controlling and Protecting Windows Applications by Analyzing and Manipulating PE File Format

Rawaa P. Qasha, Zaid A. Monther

PE (Portable Executable) is the native file format of Windows32. Analyzing and manipulating the PE file gives valuable insights into the structure and work of Windows. This research includes...

DOI: 10.33899/csmj.2012.163668

Pages: 23-33
The Basis Number of Quadruple Join of Graphs

Raghad A. Mustafa, Ghassan T. Marougi

The basis number, b(G) ,of a graph G is defined to be the smallest positive integer k such that G has a k-fold basis for its cycle space. We investigate an upper bound for .It is proved that, if...

DOI: 10.33899/csmj.2012.163685

Pages: 27-34
A New Method for Iris Segmentation and Feature Extraction in Spatial Domain

Dujan B. Taha, Shamil Q. Ibraheem

In this paper, a new proposed method is developed, this method contains two algorithms, one for human iris recognition, the other is for extracting the features of the recognized iris. Many studies...

DOI: 10.33899/csmj.2012.163669

Pages: 35-46
Development Of Traditional Algorithms and Make a Hybrid Algorithm to Denoising The Color Images

Hanan Hamid Ali

The development in life has made the need very important for using images in many scientific fields like space, engineering and medicine. Due to the fact that such images are affected by various...

DOI: 10.33899/csmj.2012.163686

Pages: 35-47
Steganalysis Using KL Transform and Radial Basis Neural Network

Safwan Hasoon, Farhad M. Khalifa

The essential problem in the security field is how to detect information hiding. This paper proposes a new steganalysis scheme based on artificial neural network as a classifier to detect...

DOI: 10.33899/csmj.2012.163670

Pages: 47-58
Automatic Test Cases Generation Using an Advanced GEP Method

Najla Akram Al-Saati, Roua Basil

This research aims to provide a practical work on the principle of the Extreme Programming (XP) which is a type of the Agile Software Development Methods which is used in the generation of...

DOI: 10.33899/csmj.2012.163687

Pages: 49-65
Image Coding Using EZT Based on Contourlet Transformation

Khalil I. Alsaif, Teba M. Ghaze

Due to the fact that most of the application on EZT algorithm were applied on wavelet transformation. In the last ten years, the contourlet transformation shows that its efficiency is higher than...

DOI: 10.33899/csmj.2012.163671

Pages: 59-72
Authentication of data hiding using co-occurrence matrix

Melad jader saeed, Ghada thanoon

This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying...

DOI: 10.33899/csmj.2012.163688

Pages: 67-78
Development a Special Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems

Basim A. Hassan

This paper develops a special conjugate gradient algorithm for solving unconstrained minimized problems. This development can be regarded as some kind of convex combination of the MPR and MLS...

DOI: 10.33899/csmj.2012.163672

Pages: 73-84
w-Hosoya polynomials for Pentagonal Chains

Ali Aziz Ali, Shwan Salou Abdul Ilyas

Properties of the width distance in graphs are given in this paper . The w-Hosoya Polynomials of straight pentagonal chains and of alternate pentagonal chains are obtained with Wiener indices of...

DOI: 10.33899/csmj.2012.163689

Pages: 79-91
Brain Tumor Detection Using Snake Algorithm and Fuzzy C-Mean

Ramadan M. Ramo

In this research, two methods have been suggested for the detection of the brain tumor . (which is defined as the abnormal growth of cells), The first method is used the snake algorithm and the...

DOI: 10.33899/csmj.2012.163673

Pages: 85-100
A Proposed Methodology for Software Engineering of Agent Systems

Asmaa Yaseen Hammo, Maher Talal Alasaady

In recent years, computer systems that make use of software agents are increased, due to the increased size and complexity of these systems, as well as, because the benefits provided by agents to...

DOI: 10.33899/csmj.2012.163690

Pages: 93-115
De-speckling 2D-Discrete Wavelet Transform with Hard Threshold Stage

Dhafer F. Hasan, Maha A. Abdul-Jabar, Zahraa T. Abed Al-Mokhtar

In this work, a new method is implemented for removing noise from gray scale image that depends on two-dimensional discrete wavelet transform and Threshold stage (hard threshold). This paper...

DOI: 10.33899/csmj.2012.163674

Pages: 101-112
Development AES Algorithm to Encryption Images and Sounds Files

Mohammed C.Y. Al-Zubaidy

In this research, the Advanced Encryption Standard (AES) algorithm was developed, the AES is used for encryption and decryption the images and sounds files by expanding the block size of data to...

DOI: 10.33899/csmj.2012.163675

Pages: 113-127
Compression Image by Using Iterated Function Systems

Basil Y. Al-khayat, Mahasin Thabit Younis

This research was in the compression digital images using the iterative function and applied to grayscale images, color images and then re-pressed image decoding. Matlab language is used for...

DOI: 10.33899/csmj.2012.163691

Pages: 117-133
A Study on the Conditions of Oscillation of Solutions of Second Order Impulsive Delay Differential Equations

Muayyad M. Khalil

Oscillation conditions of second order impulsive delay differential equations with impulses are investigated, some sufficient conditions for all solutions to be oscillatory are obtained. Also, two...

DOI: 10.33899/csmj.2012.163676

Pages: 129-137
Using The Value of GPS To Determined The Position Of The Mobile User in Mosul University

Ghayda A.A. Al-Talib, Hiba Muneer Yahya

The Mobile is a circuit that receives and sends signals through earth stations and satellites so the objective of this research is to build a system that retrieves information about the location of...

DOI: 10.33899/csmj.2012.163692

Pages: 135-146
The Detour Polynomials of Ladder Graphs

Ali Aziz Ali, Gashaw A. Muhammed-Saleh

The detour distance between two distinct vertices and of a connected graph is the length of a longest path in. The detour index of is defined by, and the detour polynomial of is . The detour...

DOI: 10.33899/csmj.2012.163677

Pages: 139-146
On Simple GP – Injective Modules

Mohammed Th. Youns, Najlaa T. Jassim

In this paper, we study rings whose simple right R-module are GP-injective. We prove that ring whose simple right R-module is GP-injective it will be right -weakly regular ring. Also, proved that...

DOI: 10.33899/csmj.2012.163678

Pages: 147-154
A Full List of Projectively Distinct K-Arcs in Finite Projetive Space Pg(2,8)

Ali Ahmed A. Abdulla, Abdulkhalik L. Yasin

A k-arc in a plane PG(2,q) is a set of k point such that every line in the plane intersect it in at most two points and there is a line intersect it in exactly two points. A k-arc is complete if...

DOI: 10.33899/csmj.2012.163693

Pages: 147-158
New Study of Stability for New Lorenz-like System

Alaa Hammodat, Ahmmed Jumaa

In this paper, we studied differential system like of three dimensional Lorenz system. Nonlinear characteristic and basic dynamic properties of three dimensional autonomous system are studied by...

DOI: 10.33899/csmj.2012.163679

Pages: 155-161
Employing Information technology in Designing a Network Based Human Resources Information System

Raed Abdul Qadir Hamid, Inaam Abdul Jabbar Sultan

The research deals with the importance of ICT in the design of HRIS based on the network. Its importance lies in the practical side, through the adoption of the Technical Institute / Nineveh...

DOI: 10.33899/csmj.2012.163694

Pages: 159-174
Hybrid hiding in multimedia files

Farah Tareq Mohammed

The principle of hybrid information hiding represented by process of information hiding message (multimedia files) embedded inside another message which is depended on hiding a certain media in...

DOI: 10.33899/csmj.2012.163695

Pages: 175-185
A New Type of ξ-Open Sets Based on Operations

Haji M. Hasan

The aim of this paper is to introduce a new type of -open sets in topological spaces which is called -open sets and we study some of their basic properties and characteristics.

DOI: 10.33899/csmj.2012.163682

Pages: 181-189
Design Genetic Algorithm To Find The Optimal Critical Path Network Project (GAOCPN)

Samaa Tlayea Azeez, Niam Al-Thanoon, Lamyaa Jasim Mohammed

The present study deals with using up-to-date intelligenttechniques. We try to utilize the genetic algorithm efficiently and integrate it with the problem of study by designing and applying a...

DOI: 10.33899/csmj.2012.163696

Pages: 187-210
Pθ-Topological Groups in Nonstandard Analysis

Tahir H. Ismail, Ibrahim O. Hamad, Sami A. Hussein

The aim of this paper is to introduce and study a new class of topological groups called P-topological group. By using some nonstandard techniques, we investigated some properties of P-monads in...

DOI: 10.33899/csmj.2012.163683

Pages: 191-199