Volume 13 Issue 1
Published: 2019-06-05
Contents
Research Paper
Applying the Method of Enhancing Feedback Control On a 4D Hyperchaotic System
Mahasin Thabit Younis
In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System...
DOI: 10.33899/csmj.2020.163499
Detection and Classification of Emotional State Based on Speech Signal
Hiba Adreese Younis, Mrewan Mustafa, Rahma Raad
In this research, an algorithm was proposed to automatically classify the mood of the speaker by referring to his speech. Three moods were adopted in this study, namely joy, sadness and anger in...
DOI: 10.33899/csmj.2020.163505
New Parameter of CG-Method for Unconstrained Optimization
Hamsa Th. Chilmeran, Satia A. Al-Taie, Enaam Gh. Saeed
In this paper, we derived a new parameter by equating the modified QN direction which is suggested by [7] and the standard CG method which satisfied the sufficient descent condition and the global...
DOI: 10.33899/csmj.2020.163500
A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata
Ansam O. Abdulmajeed, Fatima M. Abdullatif, Wafaa A. Mustafa
The present research was aimed to design and implement an algorithm that combines cryptography and steganography to achieve a higher level of security. The algorithm hid encrypted text into color...
DOI: 10.33899/csmj.2019.163507
Proposed Algorithm For Using GLCM Properties To Distinguishing Geometric Shapes
Kifaa Thanoon
In this research, an algorithm was used to look at the characteristics of a set of images for geometric shapes and then to classify them into totals based on four characteristics obtained from the...
DOI: 10.33899/csmj.2020.163501
Hybrid Method between the Discrete Wavelets Translate Technique and the Chaos System Based by the Least Significant Bit Algorithm to Encrypt and Hide a Digital Video File
Hasan Maher Ahmed
The use of computers today is the most important and widespread means of storing, retrieving and circulating information through local and international networks and smart phones. Thus it is...
DOI: 10.33899/csmj.2020.163508
Image Enhancement Techniques for Images at Blur Motion and Different Noises
Sahlah Abed Ali
Image restoration is an art to improve image quality by disposing of reducing the amount of noise and blurring present in the image. So it is one of the research titles of interest to the...
DOI: 10.33899/csmj.2020.163502
Income Tax for Employees using Visual Basic and Access Database
Ruba T. Ibrahim, Mohamed I. Mohamed, Nashwan A. Ramadan
In previous years, database applications were built in the form of a file system, but many disadvantages were found after that, such as: data replication , inconsistency while storing, difficulty...
DOI: 10.33899/csmj.2020.163509
17 New Existences linear [n,3,d]19 Codes by Geometric Structure Method in PG(2,19)
Nada Yassen Kasm Yahya, Mustafa Nadhim Salim
The purpose of this paper is to prove the existence of 17 new linear [337,3,318]19, [289,3,271]19, [266,3,249]19, [246,3,230]19, [219,3,204]19, [206,3,192]19, [181,3,168]19, [157,3,145]19,...
DOI: 10.33899/csmj.2020.163503
Use the Brute_Force Pattern Matching Algorithm for Misuse Intrusion Detection System
Haleema Essa Sulaiman
Security issues, like network intrusion and viruses, have been increased widely with the growth of computer applications and networks. Therefore, it becomes necessary to develop methods to protect...
DOI: 10.33899/csmj.2020.163510
A Robust Spectral Three-Term Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems
Abbas Y. Al-Bayati, Sabreen M. Abbas
In this paper, we investigated a new improved Conjugate Gradient (CG) algorithm of a Three-Term type (TTCG) based on Dai and Liao procedure to improve the CG algorithm of (Hamoda, Rivaie, and Mamat...
DOI: 10.33899/csmj.2020.163504





