Volume 8 Issue 1
Published: 2011-06-02
Contents
Research Paper
New Hybrid Cutting Plane Method For Solving Integer Linear Programming Problems
Abbas Y. Al-Bayati, Nawar N. Abdullah
This work deals with a new method for solving Integer Linear Programming Problems depending on a previous methods for solving these problems such that Branch and Bound method and Cutting Planes...
DOI: 10.33899/csmj.2011.163619
The Extended CG Method for Non-Quadratic Models
Abbas Y. Al-Bayati, Basim A. Hassan, Sawsan S. Ismael
This paper investigates an interleaved algorithm which combines between the extended conjugate gradient with the hybrid method of Touati-Storey. This combined algorithm is based on the exact line...
DOI: 10.33899/csmj.2011.163604
Comparison of Finite Difference Solution Methods for Reaction Diffusion System in Two Dimensions
Abbas Y. Al-Bayati, Abdulghafor M. Al-Rozbayani, Saad A. Manaa
In this paper, we study three types of finite difference methods, to find the numerical solution of reaction difference systems of PDEs in two dimensions. These methods are ADE, ADI and Hopscotch,...
DOI: 10.33899/csmj.2011.163605
Embedding and Extracting the Watermark in Video Files using Intelligent Techniques
Shahba I. Khaleel
This research, design a watermarking system for embedding and extracting the watermark in video files. This research presented four-efficient and powerful ways to embed and extract the watermark,...
DOI: 10.33899/csmj.2011.163620
New Construction and New Error Bounds for (0, 2, 4) Lacunary Interpolation By Six Degree Spline
Karwan H. Jwamer, Ridha G. Karem
The object of this paper obtains the existence, uniqueness and upper bounds for errors of six degree splines interpolating the lacunary data (0, 2, 4). We also show that the changes of the boundary...
DOI: 10.33899/csmj.2011.163606
Adopting Egin Value of Speech Signal in Distinguishing the Gender of the Speaker
Maysoon Khidr Al-Nuaimi
In this research a new approach was to represent the speech signal into two dimensional array to make it suitable for evaluating the egin value for this signal. So many samples of speech signal for...
DOI: 10.33899/csmj.2011.163621
Neural Network with Madaline for Machine Printed English Character Recognition
Shaymaa M. Al-mashahadany
The recognition of optical characters is known to be one of the earliest applications of Artificial Neural Networks, which partially emulate human thinking in the domain of artificial...
DOI: 10.33899/csmj.2011.163607
Stability Analysis of Flow in Thin Liquid Film Under Heat Effect
Zena Talal Al-Nuamy
This research is dedicated for analyzing the stability of system of flow equations for a delicate chip of a fluid exposed for medium heat ,where we found the growth of disturbance exist or not...
DOI: 10.33899/csmj.2011.163623
Existence, Uniqueness and Stability Theorems for Certain Functional Fractional Initial Value Problem
Joseph G. Abulahad, Shayma A. Murad
In this paper, we deal with non-linear functional fractional differential equation with initial condition in space. We will study the existence, uniqueness and stability of the solution of...
DOI: 10.33899/csmj.2011.163608
Finite Differences Methods for solving Korteweg-de Vries-Burger's Equation
Ekhlass S. Al-Rawi, Almutasim Albaker
In this paper we solved the Korteweg-de Vries-Burger's equation numerically by finite difference methods, using two different schemes which are the Fully Implicit scheme and the Exponential finite...
DOI: 10.33899/csmj.2011.163624
On N–Flat Rings
Raida D. Mahmood, Husam Q. Mohammad
Let I be a right ideal of R, then R / I is a right Nflat if and only if for each a I, there exists b I and a positive integer n such that an 0 and an = ban. In this paper, we first give and...
DOI: 10.33899/csmj.2011.163609
Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs
Adel S. Issa
With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recent...
DOI: 10.33899/csmj.2011.163610
Studying the Stability of One of Non-Linear Autoregressive Relational Models
Abdulghafoor Gasim Salim, Hamed Mohammed Kalaf
Time series are usually built on basic assumptions involving stability, Linearity and normality, these three features are so important in both estimating and building the time series models. The...
DOI: 10.33899/csmj.2011.163625
Hybrid Technique Used for Straight Line Detection
Fawziya Mahmood Ramo, Khalil I. Al-Saif, Nidhal Al-Assady
Many techniques have been used in this research to detect straight line in digital image on the same samples. These techniques are:1-Hough Transform(HT), Develpoed Barons Method (DBM)and-Genetic...
DOI: 10.33899/csmj.2011.163611
Speech Synthesis of Arabic Vocabularies
Enaam Ghanim Saeed
In this paper, system is presented for speech synthesis of Arabic vocabularies written with diacritics, graphemes transfer to allophones by applying the phonological rules. The system depend on...
DOI: 10.33899/csmj.2011.163626
Iterative Image Interpolation vs. Traditional Interpolation Methods
Samia Sh. Lazar
Image interpolation is an important image processing operation applied in diverse areas ranging from computer graphics, rendering, editing, medical image reconstruction, and online image viewing....
DOI: 10.33899/csmj.2011.163612
Employment the Object Oriented Idea with Relational Database using by Ado.Net
Ban Ghanm M.
With the development of technology and appearing of computers that simplified many of computer and logical applications, so the developed with all capabilities to take and give the benefit in the...
DOI: 10.33899/csmj.2011.163627
A Survey of Two Optimization Methods to Solve a Modified Minimal Spanning Tree Problem in Undirected Tree Graph
Isra N. Alkallak, Ruqaya Z. Sha’ban
The paper tackled a survey of two optimization methods to study spanning tree problem by modifying the spanning tree problem to generate all of possible solutions in undirected tree graph with...
DOI: 10.33899/csmj.2011.163613
Dual Hiding in Digital Image Files
Farah Tareq Mohammed
The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission...
DOI: 10.33899/csmj.2011.163629
Recognition of Printed English Characters Using Morphological Operations
Rana A. Mohammed
A morphological printed English character recognition approaches for binary images is shown in this research. Three morphological operations are used for printed English character recognition:...
DOI: 10.33899/csmj.2011.163614
Efficiency of Four Virtual LANs Switches with Equal Processing Times
Jassim M. Abdul-Jabbar, Wijdan Y.A. Al-Karim, Rana A. Mohamed
Virtual LANs (VLANs) are introduced as some alternative switches to solve for the traffic problems of those LAN networks with Hubs. The idea is to create some collections in the whole LAN network,...
DOI: 10.33899/csmj.2011.163615
Studying the Stability of one of Non-Linear Autoregressive Models with Application
Abdulghafoor Gasim Salim, Raadi Awad Alhamdan
In This paper we suggest one of the models for non-linear Autoregressive by using local linear approximation method, then we studied the conditions of stationarity of the model specifically the...
DOI: 10.33899/csmj.2011.163630
Existence Results of Fractional Mixed Volterra -Fredholm Integrodifferential Equations with Integral Boundary Conditions
Sohaib T. Hasan, Rabeea M. Hani
In this paper, we give an existence results for the fractional mixed Volterra -Fredholm integrodifferential equation with Integral Boundary Conditions. First, we use the Banach contraction...
DOI: 10.33899/csmj.2011.163616
An Approximate Solution to The Newell-Whitehead Equation by Adomian Decomposition Method
Saad A. Manaa
In this paper, we solved the Newell-Whitehead equation approximately using Adomain Decomposition method and we have compared this solution with the exact solution; we found that the solution of...
DOI: 10.33899/csmj.2011.163617





