Volume 8 Issue 2

Published: 2011-12-08

Contents


Article
Information Hiding Based on Chan-Vese Algorithm

Samia Sh. Lazar, Nadia M. Mohammed

The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and...

DOI: 10.33899/csmj.2011.7876

Pages: 99-110
Research Paper
A New Symmetric Rank One Algorithm for Unconstrained Optimization

Abbas Y. Al-Bayati, Salah G. Shareef

In this paper, a new symmetric rank one for unconstrained optimization problems is presented. This new algorithm is used to solve symmetric and positive definite matrix. The new method is tested...

DOI: 10.33899/csmj.2011.163637

Pages: 13-19
Stability Analysis in Thin Liquid Film (Immobile Soap Film)

Rotina Jasim Al-Etewi, Zena Talal Al-Nuamy

This research is dedicated for analyzing the stability of a system of flow equations for soap film that has opposed for disturbance, and this analysis was done by using Galerkin method which enable...

DOI: 10.33899/csmj.2011.163648

Pages: 13-21
P-Stability of Linear Multistep Methods for Delay Retarded Differential Equations with Several Delays

Abbas Y. Al-Bayati, Ann J. Al-Sawoor, Reyadh S. Naoum

This paper modifies the numerical solution of initial value problems of the Delay Differential Equations (DDEs) by making it deals with Retarded Differential Equations (RDEs) with several delays...

DOI: 10.33899/csmj.2011.163638

Pages: 21-33
Segment the Medical Images based on Contourlet Transformations

Khalil I. Al-Saif, Karam M. Abdullah

In this paper, we have studied the Normalized Cut algorithm to segment the medical images that was widely used in the last decade. And we based on Image in contourlet domain that supports rich...

DOI: 10.33899/csmj.2011.163649

Pages: 23-34
Information Hiding Techniques Using Network Protocols

Manar Younis Kashmola, Ameera Bibo Sallo

The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol...

DOI: 10.33899/csmj.2011.163650

Pages: 35-50
New Variable Metric Algorithm by The Mean of 2nd Order Quasi-Newton Condition

Abbas Y. Al-Bayati, Runak M. Abdullah

In this paper a new class of Quasi-Newton update for solving unconstrained nonlinear optimization problem is proposed. In this work we suggested a new formula for the variable metric update with a...

DOI: 10.33899/csmj.2011.163639

Pages: 35-41
Numerical Stability of Brusselator System

Saad A. Manaa, Rostam K. Saeed, Fadhil H. Easif

The numerical stability analysis of Brusselator system has been done in one and two dimensional space. For one dimension we studied the numerical stability for explicit and implicit (Crank-...

DOI: 10.33899/csmj.2011.163640

Pages: 43-52
Hyper Secure Algorithm for Text

Melad jader saeed

Classical encryption methods depend on two basic encryption method, namely MONO ALPHABET and POLY ALPHABET. In this research, we developed a hybrid encryption algorithm to overcome the weaknesses...

DOI: 10.33899/csmj.2011.163651

Pages: 51-65
On n - Regular Rings

Raida D. Mahmood, Mohammed Th. Youns

As a generalization of regular rings, that is a ring is called n-regular if for all . In this paper, we first give various properties of n-regular rings. Also, we study the relation between such...

DOI: 10.33899/csmj.2011.163628

Pages: 53-59
Some Algebraic and Analytical Properties of Special Matrices

Laith K. Shaakir, Akram S. Mohamed, Nazar K. Hussein

In this work we present a subset of ( is the set of all matrices ) which we called the set of special matrices and denoted it by . We give some important properties of .

DOI: 10.33899/csmj.2011.163642

Pages: 61-73
Design Educational Bag in Basics of Image Processing

Ghada Mohammad Tahir Qasim

The didactic bags which are programs designed to replace the teacher in a certain scientific field, are the modernist didactic means which proved great activity in the didactic process and due to...

DOI: 10.33899/csmj.2011.163652

Pages: 67-83
Monotonicity of Some Functions Involving The Beta Function

Hanadi D. Saleem

In this short paper the monotonicity of functions involving the Beta function is considered to be study by using a similar method given in [2] and [4].

DOI: 10.33899/csmj.2011.163643

Pages: 75-77
Intrusion Detection System Based on Neural Networks Using Bipolar Input with Bipolar Sigmoid Activation Function

Adel S. Issa, Adnan M. Abdulazeez

Vulnerabilities in common security components such as firewalls are inevitable. Intrusion Detection Systems (IDS) are used as another wall to protect computer systems and to identify corresponding...

DOI: 10.33899/csmj.2011.163644

Pages: 79-86
Design and Build a Database Management System for Computer Science Department Students

Ryan Youssef Yaacoub, Muhammad Hashem Sultan

Student's system has been analyzed and A database was designed according to their registration, study and lectures attending , with full documentation to their degrees, the information of...

DOI: 10.33899/csmj.2011.163653

Pages: 85-104
Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform

Shaimaa Sh. Mohammad

In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has...

DOI: 10.33899/csmj.2011.163645

Pages: 87-97
On the Basis Number of Some Special Graphs for Mycielski’s Graph

Ghassan T. Marougi, Raghad A. Mustafa

The basis number b(G) ,of a graph G is defined to be the least positive integer k such that G has a k-fold basis for its cycle space. In this research paper,we have studied the basis number of some...

DOI: 10.33899/csmj.2011.163654

Pages: 105-124
Using Δ - Discriminate Method to Determine the Stability and Bifurcation of Chen Chaotic System

Saad Fawzi AL-Azzawi, Karam A. Abed

The aim of this paper to found that the stability and bifurcation of Chen System by using a new method which called - discriminate method as will as we found the stability at the second critical...

DOI: 10.33899/csmj.2011.163646

Pages: 111-122
Hosoya Polynomials of The Width Distance of Some Cog-Special Graphs

Ahmed M. Ali, Tahir H. Ismail

In this paper, we give some definitions and properties of the width distance and find the Hosoya polynomials, Wiener indices, and the average distances of some special cog-graphs with respect to...

DOI: 10.33899/csmj.2011.163647

Pages: 123-137
Building an Intelligent System to Distinguish Russian Printed Letters using Artificial Neural Networks

Jamal S. Majeed, Sura R. Sherif, Osama Y. Mohamed

In this research, an intelligent computer system is designed for recognizing printed Russian letters by extracting features of the letter by finding the Eigen values which then used for training...

DOI: 10.33899/csmj.2011.163655

Pages: 125-141
Unsteady Flow to Viscous Thin Films on a Vertical Surface

Khidr M.S. Khidr, Hanin T. Jasim, Hikmat Mustafa

In this paper we have investigated the unsteady flow to thin films of an incompressible liquids with no inertia force, continuity equation and Nervier-Stokes equations are used to obtain the...

DOI: 10.33899/csmj.2011.163656

Pages: 143-149
An Investigation for Steganalysis in Color Images

Samah F. Aziz, Ahmed S. Nori

With science developing and techniques used in Information hiding, there are another techniques wall together for Steganalysis. Steganography is considered as the new and the complementary system...

DOI: 10.33899/csmj.2011.163657

Pages: 151-167
Design a Software Engineering CASE Tool (ERToOracle10g) to transform a graphical Entity Relationship model (ER model) to Oracle10g

Nada N. Saleem, Saad Ahmed Th.

CASE Tools play a significant role in the field of software engineering development processes where they are utilized in system modeling and analysis, in system design and in generating automatic...

DOI: 10.33899/csmj.2011.163658

Pages: 169-180