Volume 10 Issue 4
Published: 2013-12-15
Contents
Research Paper
Study and Developing a Network Security Prototype Based on Agent Technology
Najla Badie Ibraheem, Haleema Essa Sulaiman
ABSTRACT A preliminary prototype has been designed and implemented in this work to support network security that used to detect a misuse in the network environment, the events have been taken from...
DOI: 10.33899/csmj.2013.163553
On WJCP-Injective Rings
Raida D. Mahmood, Shahla M. Khalil
As a generalization of right injective rings, we introduce the nation of right injective rings, that is for any right nonsingular element of R, there exists a positive integer and and any right -...
DOI: 10.33899/csmj.2013.163542
A Globally Convergence Spectral Conjugate Gradient Method for Solving Unconstrained Optimization Problems
Basim A. Hassan
In this paper, a modified spectral conjugate gradient method for solving unconstrained optimization problems is studied, which has sufficient descent direction and global convergence with an...
DOI: 10.33899/csmj.2013.163543
New Reverse Engineering Tool to Transform Oracle10g Code to Entity Relationship Model
Nada N. Saleem, Saad Ahmed Th.
Reverse engineering is one of the important operations performed on programming codes to get their design presented graphically. Reverse engineering is performed on various types of databases to...
DOI: 10.33899/csmj.2013.163554
New Scale Dai-Yaun Conjugate Gradient Method for Unconstrained Optimization
Hamsa Th. Chilmerane
Conjugate gradient algorithm is widely used for solving large-scale unconstrained optimization problems, because they do not need the storage of matrices. In this paper, we suggest a modified...
DOI: 10.33899/csmj.2013.163544
Using the Genetic Algorithm in Developing a Method for Steganography
Nadia M. Mohammed
This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two...
DOI: 10.33899/csmj.2013.163555
On Maximal Chains In Partially Ordered Sets With Compatible (Left, Right)- Group Actions
Abdul Aali J. Mohammad, Eman M. Tahir
In this paper, we deal with compatible (left, right)-group actions on posets, i.e; (G, H)-posets. Our main purpose in this work is to study the maximal chains in (G, H)-posets to observe that this...
DOI: 10.33899/csmj.2013.163545
Design Hybrid Algorithm for Video Encoding
Ghada Mohammad Tahir Qasim, Toqa Zuhair, Sahar Saleh, Amena Emad
The most of the related studies and researches have focused on encrypting video files on speed and accuracy in the process of encryption. Some of them have focused on reducing the time required for...
DOI: 10.33899/csmj.2013.163556
Rule Based Planning for Solving Hanoi Problem
safwan hasoon
In this research, the planning intelligence technique has been developed and applied to solve the tower of Hanoi puzzle through the construction of the rule based included a set of facts and rules...
DOI: 10.33899/csmj.2013.163546
Smarandache Rings and Smarandache Elements
Parween A. Hummadi, Shadan A. Osman
In this paper, we study some Smarandache (S) notions in some types of rings. Conditions are given under which is a Smarandache ring. We study Smarandache ideals, Smarandache subrings and...
DOI: 10.33899/csmj.2013.163547
Hiding digital image watermarking in a sound signal using Wavelet Transform and Singular Value Decomposition
Alyaa Moufaq Abdul Majeed Haleem, AlAA Zakaria
The outgrowing of multimedia applications in communications network brought about an increasing need to provide qualified methods to protect these media and secure communication. These methods...
DOI: 10.33899/csmj.2013.163557
Nullity and Bounds to the Nullity of Dendrimer Graphs
Khidir R. Sharaf, Didar A. Ali
In this paper, a high zero-sum weighting is applied to evaluate the nullity of a dendrimer graph for some special graphs such as cycles, paths, complete graphs, complete bipartite graphs and star...
DOI: 10.33899/csmj.2013.163548
Hybrid System: Parallel Neural -Genetic Algorithm Algorithm for Compacting Fractal Images Using Multiple Computers
Shahla A. Abdel-Qader, Suzan K. Ibrahim, Omia Gh. Abdel-Jabbar
Recently, effective technologies in Fractal Image Coding (FIC) were used to reduce the complexity of search for the matching between the Range blocks and the Domain blocks which reduces the time...
DOI: 10.33899/csmj.2013.163558
Applying Gene Expression Programming for Solving One-Dimensional Bin-Packing Problems
Najla Akram Al-Saati
This work aims to study and explore the use of Gene Expression Programming (GEP) in solving on-line Bin-Packing problem. The main idea is to show how GEP can automatically find acceptable heuristic...
DOI: 10.33899/csmj.2013.163549
Hybridization of the Artificial Immune Network Using the Backpropagation Neural Network
Omar Saber Qasim, Israa Rustum Mohammed
In this research building style simulation developed is applied in the field of pattern recognition medical patients osteoporosis through a process of integrating and hybridization between...
DOI: 10.33899/csmj.2013.163559
Hybrid Genetic Algorithm with Filters to Image Enhancement
Baydaa S Bhnam
Image enhancement is a useful and necessary part of image processing and its analysis. The quality of an image could be corrupted by different kinds of noises, added due to the undesired conditions...
DOI: 10.33899/csmj.2013.163550
Online Face Detection and Recognition in a Video Stream
Maha A. Hasso Al-Ghurery, Manar A. Zidan Al-Abaji
Faces detection and recognition process received considerable attention during the past decade, it is still considered one of the most important studies in the field of Image Processing, Pattern...
DOI: 10.33899/csmj.2013.163560
The Effect of Inclination into Heat Convection Flow of Dissipative Fluid in a Channel of Porous walls
Tagread H. Shuker
This paper is devoted to the study of the effect of inclination into heat transfer by natural convection of fluid flowing through a channel with porous walls; the model has been created by using...
DOI: 10.33899/csmj.2013.163551
Review Paper
Stability Analysis of Anonlinear Autoregressive Model of First Order
Abdulghafoor Gasim Salim, Abeer Abdulkhaliq Ahmed
In this paper, we study the moment of a non linear autoregressive polynomial model of first order, also we analysis the stability of this model and find the singular point as well as the limit...
DOI: 10.33899/csmj.2013.163561
Using Exponential Finite Difference Method for Solve Kuramoto-Sivashinsky Equation with Numerical Stability Analysis
Abdulghafor M. Al-Rozbayani, Shrooq M. Azzo
In this paper we solved the Kuramoto-Sivashinsky Equation numerically by finite-difference methods, using two different schemes which are the Fully Implicit scheme and Exponential finite difference...
DOI: 10.33899/csmj.2013.163562





