Volume 9 Issue 2

Published: 2012-12-04

Contents


Research Paper
Stability Study of Double and Spherical Pendulum

Thair Y. Thanoon, Noor Husain Abdullah

This paper devoted to study the stability of periodic motion for physical application which is leads to differential equations of second order )Double and Spherical Pendulum( respectively by using...

DOI: 10.33899/csmj.2012.163716

Pages: 13-26
A New Preconditioned Inexact Line-Search Technique for Unconstrained Optimization

Abbas Y. Al-Bayati, Ivan S. Latif

In this paper, we study the global convergence properties of the new class of preconditioned conjugate gradient descent algorithm, when applied to convex objective non-linear unconstrained...

DOI: 10.33899/csmj.2012.163698

Pages: 25-39
Fractal Compression of Colored Animated Pictures

Basil Thanoon Younis, Abeer Abdul Khaliq Thanoon

This research deals with the question of pressing two series of video images by using the pressing Fractal through the use of iterative function systems, where the film frame video acquired is...

DOI: 10.33899/csmj.2012.163717

Pages: 27-41
Romberg Algorithm to Solve a System of Nonlinear Fredholm Integral Equations of Second Kind

Abbas Y. Al-Bayati, Rostam K. Saeed, Kawa M. Aziz

In this paper, we use Romberg algorithm, to find an approximation solution for a system of nonlinear Fredholm integral equations of the second kind. A comparison between this approximations and...

DOI: 10.33899/csmj.2012.163699

Pages: 41-52
Evaluate and comparission between Software Engineering Methodologies of Agent Systems

Asmaa Yaseen Hammo, Maher Talal Alasaady

Agent based systems software engineering is a new model in the field of software engineering. It provides new approaches for developing agent based systems. Numerous methodologies for agent based...

DOI: 10.33899/csmj.2012.163718

Pages: 43-61
On n-Weakly Regular Rings

Raida D. Mahammod, Mohammed Th. Al-Neimi

As a generalization of right weakly regular rings, we introduce the notion of right n-weakly regular rings, i.e. for all aN(R), aaRaR. In this paper, first give various properties of right n-weakly...

DOI: 10.33899/csmj.2012.163700

Pages: 53-59
On m-Regular Rings

Zubayda M. Ibraheem, Maha F. Khalaf

As a generalization of regular rings, we introduce the notion, of m-regular rings, that is for all , there is a fixed positive integer m such that is a Von-Neumann regular element. Some...

DOI: 10.33899/csmj.2012.163701

Pages: 61-70
Determined the Edges Using the ant Colony Algorithm and Apply them to Medical Images

Maha Abdul Rahman Hasso, Aseel Ismail Ali

Ant Colony Optimization (ACO) is a method of heuristic search using in general artificial intelligence (swarm intelligence) to simulate the behavior of the aggregate food for ants to find new...

DOI: 10.33899/csmj.2012.163719

Pages: 63-79
Local Existence Theorem of Fractional Differential Equations in Lp Space

Joseph Gh. Abdulahad, Shayma A. Murad

We proved the existence of P-integrable solution in -space, where for the fractional differential equation which has the form: with boundary condition where is the Caputo fractional derivative,...

DOI: 10.33899/csmj.2012.163702

Pages: 71-78
Alternating Direction Implicit Method for Solving Parabolic Partial Differential Equations in Three Dimensions

Abdulghafor M. Al-Rozbayani, Mahmood H. Yahya

In this paper, the parabolic partial differential equations in three-dimensions are solved by two types of finite differences, such as, Alternating Direction Explicit (ADE) method and Alternating...

DOI: 10.33899/csmj.2012.163703

Pages: 79-97
Detection of network anomaly based on hybrid intelligence techniques

Shahbaa I. Khaleel, Karam mohammed mahdi saleh

Artificial Intelligence could make the use of Intrusion Detection Systems a lot easier than it is today. As always, the hardest thing with learning Artificial Intelligence systems is to make them...

DOI: 10.33899/csmj.2012.163720

Pages: 81-98
Design and Implementation of Probabilistic Assignment Management System for a Library Database Using Object Oriented Programming

Jamal M. Hameed

Computerized information system has recently become widely available. Indeed, it has become an important instrument that can be applied in different aspects of life. One of the important...

DOI: 10.33899/csmj.2012.163704

Pages: 99-108
DNA Sequences as a Medium for Steganography Method of Codon Frequency with Character Frequency

Ahmed S. Nori, Sadoon H. Abdullah

The present study included an application of new method of steganography using DNA sequence as a medium for hiding. This method is considered as a secret cover for the secret message (text, image),...

DOI: 10.33899/csmj.2012.163721

Pages: 99-112
Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset

Mafaz Mohsin Khalil Alanezi, Najlaa B. Aldabagh

Many real world problems involve the simultaneous optimization of various and often conflicting objectives. Evolutionary algorithms seem to be the most attractive approaches for this class of...

DOI: 10.33899/csmj.2012.163705

Pages: 109-123
Traffic sign recognition by using chain code

Sundus Khaleel Ebraheem, Reham Jassim Al-Atiwi

The Traffic signs are considered as Traffic Safety tools, Because of their role in the organization of traffic and vehicles to insure the safety of the passengers, pedestrians and the structures of...

DOI: 10.33899/csmj.2012.163722

Pages: 113-126
Clustering and Detecting Network Intrusion Based on Fuzzy Algorithms

Manar Y. Kashmola, Bayda I. Khaleel

Clustering or (cluster analysis ) has been widely used in data analysis and pattern recognition. There are several algorithms for clustering large data sets or streaming data sets, Their aims to...

DOI: 10.33899/csmj.2012.163706

Pages: 125-138
Using Genetic Algorithm to Reduce the Noise Effect on Images

Baydaa S Bhnam

This paper deals with a problem that concentrates on the noise removal that the images are affected from different resources employing Genetic Algorithm with filters. To achieve the aims of the...

DOI: 10.33899/csmj.2012.163723

Pages: 127-142
The n-Hosoya Polynomial of ??⊠ Cβ

Ahmed M. Ali, Haveen G. Ahmed

For a wheel and a cycle the composite graphs is constructed from the union of and and adding the edges and , where is an edge of andis an edge of . The n diameter , the n Hosoya polynomial and...

DOI: 10.33899/csmj.2012.163707

Pages: 139-150
Sound Signal De-noising Using Wavelet Transform

Yusra Faisal Al-Irhaim, Ahmad Mohammd Suliman

In this paper, the Discrete Wavelet Transform is studied in purifying the sound signal from noise because of the good capabilities in this scope, especially when it is merged with both types of the...

DOI: 10.33899/csmj.2012.163724

Pages: 143-157
Construct a Simulator of a Proposed Trust and Reputation Model in (PD) P2P File Sharing Systems

Dujan B. Taha, Abdullah M. Salih

Trust concept is an important requirement for sustained interactions between peers, and to deal with malicious peers in P2P file sharing systems. Traditional security mechanisms and services are...

DOI: 10.33899/csmj.2012.163708

Pages: 151-165
Compression of Digital Image based on Hybrid Heuristic Algorithm

Fawziya Mahmood Ramo, Yaser Noor Al Deen

In this research paper a system has been proposed to be used in data compression of digital image based on two hybrid intelligent Algorithms. In the first algorithm which is now as Meta Heuristic...

DOI: 10.33899/csmj.2012.163725

Pages: 159-171
Extraction and Recognition of Color Feature in true Color Images Using Neural Network Based on Colored Histogram Technique

Orjuwan M.A. Aljawadi

In this research, a neural network using backpropagation (BPNN) algorithm was trained and learned to work as the cone cells in human eyes to recognize the three fundamental cells colors and hues,...

DOI: 10.33899/csmj.2012.163709

Pages: 167-181
w-Hosoya Polynomials for Connection for Some Special Graphs

Ahmed M. Ali, Assma Salah Aziz, Hafen Jalal Ahmed

Let and be any two distinct vertices in a connected graph . A container is a set of internally disjoint -paths. The width of is denoted by or is , and the length of is the length of the longest...

DOI: 10.33899/csmj.2012.163726

Pages: 173-184
A Hybrid Algorithm from Cuckoo Search Method with N-Queens Problem

Isra N. Alkallak,

This paper tackled cuckoo search method. The method is one of optimization methods with N-queens problem through proposed hybridization algorithm which mimics the behavior of cuckoo to reach the...

DOI: 10.33899/csmj.2012.163710

Pages: 183-192
Construct a Tool for Aspect-Oriented Analysis and Design Based on Theme Approach

Nada N. Saleem, Mohammad H. Abdulwahab

In this research, a (RADC-AO) tool was constructed and implemented for the requirements analysis, design and stub-code generation according to aspect-oriented (AO) concepts based on theme approach....

DOI: 10.33899/csmj.2012.163711

Pages: 193-208
Thin Films Flow Driven on an Inclined Surface

Khider M.S. Khider

The flow of unsteady incompressible two dimensional system flow of a thin liquid films with negligible inertia is investigated. Continuity equation and Navier-Stokes equations are used to obtain...

DOI: 10.33899/csmj.2012.163712

Pages: 209-217
On i α- Open Sets

Amir A. Mohammed, Omar y. kahtab

In this paper, we introduce a new class of open sets defined as follows: A subset A of a topological space is called i-open set, if there exists a non-empty subset O of X, , such that. Also, we...

DOI: 10.33899/csmj.2012.163713

Pages: 219-228
Generating a New Hyperchaotic Pan System Via State Feedback Control

Saad Fawzi AL-Azzawi

This paper proposes a new four-dimensional continuous autonomous hyperchaotic system based on the 3D Pan system by introducing a nonlinear state feedback controller. Dynamical behaviors of the new...

DOI: 10.33899/csmj.2012.163714

Pages: 229-241
Numerical Solution of a Reaction-Diffusion System with Fast Reversible Reaction by Using Adomian’s Decomposition Method and He’s Variational Iteration Method

Ann Jalal, Mohammed O. Al-Amr

In this paper, the approximate solution of a reaction-diffusion system with fast reversible reaction is obtained by using Adomian decomposition method (ADM) and variational iteration method (VIM)...

DOI: 10.33899/csmj.2012.163715

Pages: 243-257