Volume 10 Issue 2

Published: 2013-06-12

Contents


Research Paper
A Modified Augmented Lagrange Multiplier Method for Non-Linear Programming

Abbas Y. Al-Bayati, Eman T. Hamed

In this paper, we have investigated a new algorithm which employs an Augmented Lagrangian Method (ALM). It overcomes many of the difficulties associated with the Penalty function method. The new...

DOI: 10.33899/csmj.2013.163471

Pages: 13-25
Study Conditions of Center of Gravity for Trivial Solution to Semi Linear Differantial Equation of Third Order in The One Critical Cases

Thair Younis Thanoon, Zena Talal Yaseen

In this paper we study the conditions under which the zero solution iscenter of Gravity in the semi-liner case for certain third order differential equation of the form: We have: The...

DOI: 10.33899/csmj.2013.163469

Pages: 13-23
n-Hosoya polynomials for Pentagonal Chains

Ali Aziz Ali, Hadeel Abdullah Meshw

The diameter, with respect to the n-distance of the graph which represents a straight chain consisting of m pentagonal rings, is obtained in this paper. The n-Hosoya polynomial of , for all m and...

DOI: 10.33899/csmj.2013.163470

Pages: 25-42
On Completely YJ-injective Rings

Husam Q. Mohammad, Raida D. Mahammod

A ring R is called completely right YJ-injective (briefly, right CYJ injective ) if every homomorphic image of R is right YJ-injective. In this paper, we study completely right YJ-injective rings...

DOI: 10.33899/csmj.2013.163472

Pages: 27-32
New Conjugacy Coefficient for Conjugate Gradient Method for Unconstrained Optimization

Hamsa TH. Chilmeran, Huda Y. Najm

In this paper, we derived a new conjugacy coefficient of conjugate gradient method which is based on non-linear function using inexact line searches. This method satisfied sufficient descent...

DOI: 10.33899/csmj.2013.163473

Pages: 33-46
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers

Asmaa Yaseen Hamoo, Sundus Abdulmuttalib Muhamed

In order to make use of the web services, it has recently become inevitable to connect computers to the internet. This connection, however, make the computers prone to the challenges of intrusion...

DOI: 10.33899/csmj.2013.163485

Pages: 43-60
The n-Hosoya Polynomials of the Composite of Some Special Graphs

Ahmed M. Ali

It is not easy to find the n-Hosoya polynomial of the compound graphs constructed in the form G1G2 for any two disjoint connected graphs and .Therefore, in this paper, we obtain n-Hosoya polynomial...

DOI: 10.33899/csmj.2013.163474

Pages: 47-62
Designing an Eelectronic Transmission System Using the Information and Communication Technology Infrastructure "A Proposed Model for the Intranet at the University of Mosul"

Raed A. Al-Dabbagh, Mustafa Z. Al-Dabbagh

The aim of the current study is to employing ICT in a way that supports management by establishing an electronic transmission system characterized with some features different from the previous...

DOI: 10.33899/csmj.2013.163486

Pages: 61-80
A Series of Saddle - Node Bifurcation and Chaotic Behavior of a Family of a Semi - Triangular Maps

Salma M. Faris, Ammar A.M. Jameel

This paper studies the bifurcations in dynamics of a family of semi-triangular maps . We will prove that this family has a series of Saddle-node bifurcations and a period doubling bifurcation....

DOI: 10.33899/csmj.2013.163475

Pages: 63-77
Design and Implementation of Distributed Real-time Security System via Mobile Technology

Dhuha Basheer Abdullah, Wael W. Mahmood

In this paper, a distributed real time security system for monitoring and remote control on building and protecting it from unauthorized entering is designed and implemented. This system is based...

DOI: 10.33899/csmj.2013.163476

Pages: 79-99
Scansion Text Written in English language and Recognized Printed English Character using Bidirectional Associative Memory Network

Aseel W. Ali

The fact that English language is a universal language, so it is necessary to propose a computerized ways to recognize the texts written in English language, which will simplifies the reading of...

DOI: 10.33899/csmj.2013.163487

Pages: 81-94
Classification of Web Pages by Using Particle Swarm Optimization Algorithm

Ghayda A.A. Al-Talib, Muhammad Hamid Abdulraheem

As the amount of information available on the internet grows so does the need for more effective data analysis methods. This paper utilizes the particle swarm optimization (PSO) algorithm in the...

DOI: 10.33899/csmj.2013.163488

Pages: 95-112
Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem

Ruqaya Z. Sha’ban

The research tackled artificial intelligent methods to solve one of the optimization problems by using artificial ant by applying ant colony optimization algorithm and also tabu search algorithm to...

DOI: 10.33899/csmj.2013.163477

Pages: 101-112
Solution of Nonlinear 2nd Order Multi-Point BVP By Semi-Analytic Technique

Luma N.M. Tawfiq, Mariam M. Hilal

In this paper, we present new algorithm for the solution of the nonlinear second order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the...

DOI: 10.33899/csmj.2013.163478

Pages: 113-121
Hiding Information using Replacement in Silent Mutation of DNA Sequences

Ahmed S. Nori, Sadoon H. Abdullah

The present study included an application of new method of steganography using DNA sequence as a media for hiding. This method is considered a secret cover for the secret message (text, image),...

DOI: 10.33899/csmj.2013.163489

Pages: 113-134
Classification of Zero Divisor Graphs of a Commutative Ring With Degree Equal 7 and 8

Husam Q. Mohammad, Nazar H. Shuker

In 2005 J. T Wang investigated the zero divisor graphs of degrees 5 and 6. In this paper, we consider the zero divisor graphs of a commutative rings of degrees 7 and 8.

DOI: 10.33899/csmj.2013.163479

Pages: 123-127
Convergence Analysis of The Finite Difference Solution for Two Dimensions Coupled-Benjamin-Bona-Mahony System

Ekhlass S. Al-Rawi, Muhannad Shallal

This paper is devoted to drive the matrix algebraic equation for the two-dimensional nonlinear coupled-BBM system which is obtained from using the implicit finite difference method. The convergence...

DOI: 10.33899/csmj.2013.163480

Pages: 129-141
Compress Digital Image based on Genetic Meta-Heuristic algorithm

Fawziya Mahmood Ramo, Yaser Noor Al Deen

In this research a propose method has be used to compression Data of digital image based on one of Meta Heuristic Algorithm. Genetic Meta Heuristic has been applied to obtain effective data and...

DOI: 10.33899/csmj.2013.163490

Pages: 135-143
Stability Analysis for Inclined Channel by an Angle 30◦ with The Presence of Magnetic Field

Ahmmed Jumaa, Alaa Hammodat

In this research, we study the stability of a system of partial differential equations which represents fluid flow in an inclined channel and under the influence of a magnetic field perpendicular...

DOI: 10.33899/csmj.2013.163481

Pages: 143-152
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data

Naglaa B. Ibrahim, Hana M. Usman

With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as...

DOI: 10.33899/csmj.2013.163491

Pages: 145-158
An Application of He's Variational Iteration Method for Solving Duffing - Van Der Pol Equation

Ann J. Al-Sawoor, Merna A. Samarchi

In this paper, we apply He's variational iteration method (VIM) and the Adomian decomposition method (ADM) to approximate the solution of Duffing-Van Der Pol equation (DVP). In VIM, a correction...

DOI: 10.33899/csmj.2013.163482

Pages: 153-163
Face Detection in a Video File Based on Matching Face Template

Maha A. Hasso, Shahad A. Hasso

The research aim is apply algorithm for finding the number of regions to determine the largest number of faces of candidates in the video or detection, which appear in the video depending on the...

DOI: 10.33899/csmj.2013.163492

Pages: 159-172
On Some Properties of Functions on Convex Galaxies

Tahir H. Ismail, Barah M. Sulaiman, Hind Y. Saleh

In this paper, we define and study extensively a new type of external sets in , we call it "convex galaxies". We show that these convex external sets may be classified in some definite types. More...

DOI: 10.33899/csmj.2013.163483

Pages: 165-170
Modifying Explicit Finite Difference Method by Using Radial Basis Function Neural Network

Omar S. Kasim

In this research, we use artificial neural networks, specifically radial basis function neural network (RBFNN) to improve the performance and work of the explicit finite differences method (EFDM),...

DOI: 10.33899/csmj.2013.163484

Pages: 171-186
Representation of a Distributed Database System for the Medical Purposes Using Oracle

Basam A. Mustafa, Ahmed A. Al-Saman

This research concerned with the designing and implementation of a distributed database system for the medical purposes. The system has been applied on dental clinic unit and statistics department...

DOI: 10.33899/csmj.2013.163493

Pages: 173-187
Programming Mobile Applications

Nada N. Saleem, Mohammad Abdalraheem Hamdy

Mobile and wireless devices become widespread devices in the past few years, These devices made substantial progress in the important field of wireless applications which used in all areas of human...

DOI: 10.33899/csmj.2013.163494

Pages: 189-202
Genetic Linear Averaging Algorithm for Zooming Digital Images

Baydaa Sulaiman Bahnam

In this paper, the hypernation of linear averaging algorithm for zooming images is achieved with genetic algorithm. It's applied on a number of samples of images that lack the indistinction of the...

DOI: 10.33899/csmj.2013.163495

Pages: 203-218
Measurement of the Efficiency of Parallel Genetic Algorithm for Compress and Decompression of Fractal Imaging Using Multiple Computers

Shahla A. Abdul Qadir

Efficient technologies have been recently used in Fractal Image Coding (FIC) to reduce the complexity of searching for matching between Range block and Domain block. The research aims at using the...

DOI: 10.33899/csmj.2013.163496

Pages: 219-232
Stability Analysis of the Flow of Blood in the Branching and Stenoted Arteries

Rotaiyna J. Essa, Shaimaa M. Younis

This research is devoted to the stability analysis of the system of equations that describes the flow of blood in the branching and stenoted arteries. This branch takes the form of the character Y,...

DOI: 10.33899/csmj.2013.163497

Pages: 233-242
Chaotic Watermarking for Authentication

Melad Jader Saeed

This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two...

DOI: 10.33899/csmj.2013.163498

Pages: 243-257