Volume 4 Issue 1

Published: 2007-06-01

Contents


Research Paper
Enriched Algorithms for Large Scale Unconstrained Optimization

Abbas Y. Al-Bayati, Omar B. Mohammad

A new method for solving Large-Scale problems in the unconstrained optimization has been proposed in this research depending on the BFGS method. The limited memory is used in the BFGS method by...

DOI: 10.33899/csmj.2007.164001

Pages: 11-37
On Self-Scaling Variable-Metric Algorithms

Abbas Y. Al-Bayati, Mardin Sh. Taher

In this paper, we have developed a new self-scaling VM-method for solving unconstrained nonlinear optimization problems. The numerical and theoretical results demonstrate the general effectiveness...

DOI: 10.33899/csmj.2007.163992

Pages: 11-18
Stability Study of Stationary Solutions of the Viscous Burgers Equation

Mohammad Sabawi

Stability study of stationary solutions of the viscous Burgers equation using Fourier mode stability analysis for the stationary solutions , where is constant and , in two cases is analyzed....

DOI: 10.33899/csmj.2007.163993

Pages: 19-40
Numerical Solution and Stability Analysis of the Sine-Gordon Equation

Saad Abdullah Manna, Norjan Hasan Juma

The Sine Gordon equation has been solved numerically by using two finite differences methods: The first is the explicit scheme and the second is the Crank Nicholson scheme. A comparison between...

DOI: 10.33899/csmj.2007.164002

Pages: 39-56
On α-strongly θ-continuity, αθ-openness and (α, θ)-closed graphs in Topological Spaces

Abdullah M. Abdul-Jabbar

Chae et. al. (1995) have studied the concept of a-strongly q-continuous functions and (a, q)-closed graph. The aim of this paper is to investigate several new characterizations and properties of...

DOI: 10.33899/csmj.2007.163994

Pages: 41-56
On Rings whose Maximal Essential Ideals are Pure

Raida D. Mahmood, Awreng B. Mahmood

This paper introduces the notion of a right MEP-ring (a ring in which every maximal essential right ideal is left pure) with some of their basic properties; we also give necessary and sufficient...

DOI: 10.33899/csmj.2007.163995

Pages: 57-62
Speech Files Compression Based on Signal Feature

Khalil Alsaif, Saja J. Mohammed

In this research a new algorithm was suggested for compressing speech files added a new style for storing signals, The suggested idea of compression begins with recording the speech via the...

DOI: 10.33899/csmj.2007.164003

Pages: 57-79
On Rings Whose Principal Ideals are Generalized Pure Ideals

Husam Q. Mohammad

This paper , introduces the notion of a right PIGP-ring (a ring in which every principal ideal of R is a GP-ideal ) with some of their basic properties ; we also give necessary and sufficient...

DOI: 10.33899/csmj.2007.163996

Pages: 63-68
On the Wiener Polynomials of Some Trees

Ahmed M. Ali, Ali Aziz Ali

The Wiener index is a graphical invariant which has found many applications in chemistry. The Wiener Polynomial of a connected graph G is the generating function of the sequence (C(G,k)) whose...

DOI: 10.33899/csmj.2007.163997

Pages: 69-83
Using genetic Algorithm in Task scheduling for Multiprocessing System

Asmaa Yaseen Hammo, Ghosun S. Basheer, Muna M.T. Jawhar

In this work we use Genetic Algorithm for best section to implement many independent tasks on multiprocessor systems. The chromosome represented by numbers of integer value, every value represents...

DOI: 10.33899/csmj.2007.164004

Pages: 81-98
Connectable Internet Address Object Point using the Active Accessibility

Mohammed Zaki Hasan, Manar Y. Ahmed

This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities. The main purpose of it is to perform a...

DOI: 10.33899/csmj.2007.163998

Pages: 85-94
The Prime Spectra of Regular Rings

Nazar H. Shuker, Abdul Aali J. Mohammad, Huda Y. Khalil

In this work, we study the prime spectrum of regular rings. Also we study some topological concepts as quasi-compact, compact, totally disconnected, and irreducible topological space in order to...

DOI: 10.33899/csmj.2007.163999

Pages: 95-106
Examination Committee Work Management System

Turfa Y. Hamed, Abdul Aziz Suleiman, Nadia T. Saleh

The aim of this paper is to design a software for examination committee work management using Visual FoxPro programming language, which is considered as one of the most popular and useful visual...

DOI: 10.33899/csmj.2007.164005

Pages: 99-118
Using Mask Technique and Center Detection for Congenital Dislocation of the Hip (CDH) Diagnosis

Mafaz Mohsin Khalil Alanezi, Nidal H. AL-Assady, Shahla H. Ahmad

The aim of this study, is the diagnosis of Congenital Dislocation of the Hip (CDH) from routine X-Ray Image by measuring the retardation of the growth center of the head of femur bone in the...

DOI: 10.33899/csmj.2007.164000

Pages: 107-122
Numerical Analysis of the Burger Equation using Finite Differences

Badran J. Salem, Saad A. Manna

The Burger equation had been solved numerically by using two finite differences methods. The first is explicit scheme method and the second is CrankNicholson method. A comparison had been made...

DOI: 10.33899/csmj.2007.164006

Pages: 119-132
Using Computer in Primary Education

Shaima M. Al-Mashhadani

This research develops a new program to teach (reading, mathematics, and sciences for the first primary class in Iraq and with simple and interactive techniques where the computer is considered as...

DOI: 10.33899/csmj.2007.164007

Pages: 133-147
Flow in Inclined Thin Liquid Films with no Inertia Force

Joseph Gh. Abdel-Ahd, Hikmat Mustafa, Khidr M.S. Khidr

In this paper we have investigated viscous flow in symmetric thin liquid films which are inclined by an inclination angle to the horizontal for an incompressible liquids in two dimensions with no...

DOI: 10.33899/csmj.2007.164008

Pages: 149-159
Steganographic Algorithm in Spatial Domain

Ghada Mohammad Tahir Qasim, Dujan B. Taha

This research deals with design and implementation of a new steganographic algorithm to hide secret messages inside digital images. To achieve security to the transmitted messages, a secret key is...

DOI: 10.33899/csmj.2007.164009

Pages: 160-176
Using Digital Image Processing for Studying Hydrological Behavior of Tigirs River at Mosul City

Muhammad F. Omar, Khattab Faten A. Mustafa

Recently, the applications of the remote sensing increased in hydrology studies and waters management especially that concerned with rivers basins. This research includes using digital image...

DOI: 10.33899/csmj.2007.164010

Pages: 177-192
Development Hyper Algorithm for Encryption Arabic Text using Mors Code

Melad jader saeed, Najla Dabagh, Subhi Hamadi

Morse code is considered as one of the codes that are used to transfer information among long distant areas. The research concentrates on Morse code applications, transmissions to overcome...

DOI: 10.33899/csmj.2007.164011

Pages: 193-209