Volume 10 Issue 2
Published: 2013-06-12
Contents
Research Paper
A Modified Augmented Lagrange Multiplier Method for Non-Linear Programming
Abbas Y. Al-Bayati, Eman T. Hamed
In this paper, we have investigated a new algorithm which employs an Augmented Lagrangian Method (ALM). It overcomes many of the difficulties associated with the Penalty function method. The new...
DOI: 10.33899/csmj.2013.163471
Study Conditions of Center of Gravity for Trivial Solution to Semi Linear Differantial Equation of Third Order in The One Critical Cases
Thair Younis Thanoon, Zena Talal Yaseen
In this paper we study the conditions under which the zero solution iscenter of Gravity in the semi-liner case for certain third order differential equation of the form: We have: The...
DOI: 10.33899/csmj.2013.163469
n-Hosoya polynomials for Pentagonal Chains
Ali Aziz Ali, Hadeel Abdullah Meshw
The diameter, with respect to the n-distance of the graph which represents a straight chain consisting of m pentagonal rings, is obtained in this paper. The n-Hosoya polynomial of , for all m and...
DOI: 10.33899/csmj.2013.163470
On Completely YJ-injective Rings
Husam Q. Mohammad, Raida D. Mahammod
A ring R is called completely right YJ-injective (briefly, right CYJ injective ) if every homomorphic image of R is right YJ-injective. In this paper, we study completely right YJ-injective rings...
DOI: 10.33899/csmj.2013.163472
New Conjugacy Coefficient for Conjugate Gradient Method for Unconstrained Optimization
Hamsa TH. Chilmeran, Huda Y. Najm
In this paper, we derived a new conjugacy coefficient of conjugate gradient method which is based on non-linear function using inexact line searches. This method satisfied sufficient descent...
DOI: 10.33899/csmj.2013.163473
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers
Asmaa Yaseen Hamoo, Sundus Abdulmuttalib Muhamed
In order to make use of the web services, it has recently become inevitable to connect computers to the internet. This connection, however, make the computers prone to the challenges of intrusion...
DOI: 10.33899/csmj.2013.163485
The n-Hosoya Polynomials of the Composite of Some Special Graphs
Ahmed M. Ali
It is not easy to find the n-Hosoya polynomial of the compound graphs constructed in the form G1G2 for any two disjoint connected graphs and .Therefore, in this paper, we obtain n-Hosoya polynomial...
DOI: 10.33899/csmj.2013.163474
Designing an Eelectronic Transmission System Using the Information and Communication Technology Infrastructure "A Proposed Model for the Intranet at the University of Mosul"
Raed A. Al-Dabbagh, Mustafa Z. Al-Dabbagh
The aim of the current study is to employing ICT in a way that supports management by establishing an electronic transmission system characterized with some features different from the previous...
DOI: 10.33899/csmj.2013.163486
A Series of Saddle - Node Bifurcation and Chaotic Behavior of a Family of a Semi - Triangular Maps
Salma M. Faris, Ammar A.M. Jameel
This paper studies the bifurcations in dynamics of a family of semi-triangular maps . We will prove that this family has a series of Saddle-node bifurcations and a period doubling bifurcation....
DOI: 10.33899/csmj.2013.163475
Design and Implementation of Distributed Real-time Security System via Mobile Technology
Dhuha Basheer Abdullah, Wael W. Mahmood
In this paper, a distributed real time security system for monitoring and remote control on building and protecting it from unauthorized entering is designed and implemented. This system is based...
DOI: 10.33899/csmj.2013.163476
Scansion Text Written in English language and Recognized Printed English Character using Bidirectional Associative Memory Network
Aseel W. Ali
The fact that English language is a universal language, so it is necessary to propose a computerized ways to recognize the texts written in English language, which will simplifies the reading of...
DOI: 10.33899/csmj.2013.163487
Classification of Web Pages by Using Particle Swarm Optimization Algorithm
Ghayda A.A. Al-Talib, Muhammad Hamid Abdulraheem
As the amount of information available on the internet grows so does the need for more effective data analysis methods. This paper utilizes the particle swarm optimization (PSO) algorithm in the...
DOI: 10.33899/csmj.2013.163488
Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem
Ruqaya Z. Sha’ban
The research tackled artificial intelligent methods to solve one of the optimization problems by using artificial ant by applying ant colony optimization algorithm and also tabu search algorithm to...
DOI: 10.33899/csmj.2013.163477
Solution of Nonlinear 2nd Order Multi-Point BVP By Semi-Analytic Technique
Luma N.M. Tawfiq, Mariam M. Hilal
In this paper, we present new algorithm for the solution of the nonlinear second order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the...
DOI: 10.33899/csmj.2013.163478
Hiding Information using Replacement in Silent Mutation of DNA Sequences
Ahmed S. Nori, Sadoon H. Abdullah
The present study included an application of new method of steganography using DNA sequence as a media for hiding. This method is considered a secret cover for the secret message (text, image),...
DOI: 10.33899/csmj.2013.163489
Classification of Zero Divisor Graphs of a Commutative Ring With Degree Equal 7 and 8
Husam Q. Mohammad, Nazar H. Shuker
In 2005 J. T Wang investigated the zero divisor graphs of degrees 5 and 6. In this paper, we consider the zero divisor graphs of a commutative rings of degrees 7 and 8.
DOI: 10.33899/csmj.2013.163479
Convergence Analysis of The Finite Difference Solution for Two Dimensions Coupled-Benjamin-Bona-Mahony System
Ekhlass S. Al-Rawi, Muhannad Shallal
This paper is devoted to drive the matrix algebraic equation for the two-dimensional nonlinear coupled-BBM system which is obtained from using the implicit finite difference method. The convergence...
DOI: 10.33899/csmj.2013.163480
Compress Digital Image based on Genetic Meta-Heuristic algorithm
Fawziya Mahmood Ramo, Yaser Noor Al Deen
In this research a propose method has be used to compression Data of digital image based on one of Meta Heuristic Algorithm. Genetic Meta Heuristic has been applied to obtain effective data and...
DOI: 10.33899/csmj.2013.163490
Stability Analysis for Inclined Channel by an Angle 30◦ with The Presence of Magnetic Field
Ahmmed Jumaa, Alaa Hammodat
In this research, we study the stability of a system of partial differential equations which represents fluid flow in an inclined channel and under the influence of a magnetic field perpendicular...
DOI: 10.33899/csmj.2013.163481
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Naglaa B. Ibrahim, Hana M. Usman
With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as...
DOI: 10.33899/csmj.2013.163491
An Application of He's Variational Iteration Method for Solving Duffing - Van Der Pol Equation
Ann J. Al-Sawoor, Merna A. Samarchi
In this paper, we apply He's variational iteration method (VIM) and the Adomian decomposition method (ADM) to approximate the solution of Duffing-Van Der Pol equation (DVP). In VIM, a correction...
DOI: 10.33899/csmj.2013.163482
Face Detection in a Video File Based on Matching Face Template
Maha A. Hasso, Shahad A. Hasso
The research aim is apply algorithm for finding the number of regions to determine the largest number of faces of candidates in the video or detection, which appear in the video depending on the...
DOI: 10.33899/csmj.2013.163492
On Some Properties of Functions on Convex Galaxies
Tahir H. Ismail, Barah M. Sulaiman, Hind Y. Saleh
In this paper, we define and study extensively a new type of external sets in , we call it "convex galaxies". We show that these convex external sets may be classified in some definite types. More...
DOI: 10.33899/csmj.2013.163483
Modifying Explicit Finite Difference Method by Using Radial Basis Function Neural Network
Omar S. Kasim
In this research, we use artificial neural networks, specifically radial basis function neural network (RBFNN) to improve the performance and work of the explicit finite differences method (EFDM),...
DOI: 10.33899/csmj.2013.163484
Representation of a Distributed Database System for the Medical Purposes Using Oracle
Basam A. Mustafa, Ahmed A. Al-Saman
This research concerned with the designing and implementation of a distributed database system for the medical purposes. The system has been applied on dental clinic unit and statistics department...
DOI: 10.33899/csmj.2013.163493
Programming Mobile Applications
Nada N. Saleem, Mohammad Abdalraheem Hamdy
Mobile and wireless devices become widespread devices in the past few years, These devices made substantial progress in the important field of wireless applications which used in all areas of human...
DOI: 10.33899/csmj.2013.163494
Genetic Linear Averaging Algorithm for Zooming Digital Images
Baydaa Sulaiman Bahnam
In this paper, the hypernation of linear averaging algorithm for zooming images is achieved with genetic algorithm. It's applied on a number of samples of images that lack the indistinction of the...
DOI: 10.33899/csmj.2013.163495
Measurement of the Efficiency of Parallel Genetic Algorithm for Compress and Decompression of Fractal Imaging Using Multiple Computers
Shahla A. Abdul Qadir
Efficient technologies have been recently used in Fractal Image Coding (FIC) to reduce the complexity of searching for matching between Range block and Domain block. The research aims at using the...
DOI: 10.33899/csmj.2013.163496
Stability Analysis of the Flow of Blood in the Branching and Stenoted Arteries
Rotaiyna J. Essa, Shaimaa M. Younis
This research is devoted to the stability analysis of the system of equations that describes the flow of blood in the branching and stenoted arteries. This branch takes the form of the character Y,...
DOI: 10.33899/csmj.2013.163497
Chaotic Watermarking for Authentication
Melad Jader Saeed
This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two...
DOI: 10.33899/csmj.2013.163498





