Volume 8 Issue 2
Published: 2011-12-08
Contents
Article
Information Hiding Based on Chan-Vese Algorithm
Samia Sh. Lazar, Nadia M. Mohammed
The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and...
Research Paper
A New Symmetric Rank One Algorithm for Unconstrained Optimization
Abbas Y. Al-Bayati, Salah G. Shareef
In this paper, a new symmetric rank one for unconstrained optimization problems is presented. This new algorithm is used to solve symmetric and positive definite matrix. The new method is tested...
DOI: 10.33899/csmj.2011.163637
Stability Analysis in Thin Liquid Film (Immobile Soap Film)
Rotina Jasim Al-Etewi, Zena Talal Al-Nuamy
This research is dedicated for analyzing the stability of a system of flow equations for soap film that has opposed for disturbance, and this analysis was done by using Galerkin method which enable...
DOI: 10.33899/csmj.2011.163648
P-Stability of Linear Multistep Methods for Delay Retarded Differential Equations with Several Delays
Abbas Y. Al-Bayati, Ann J. Al-Sawoor, Reyadh S. Naoum
This paper modifies the numerical solution of initial value problems of the Delay Differential Equations (DDEs) by making it deals with Retarded Differential Equations (RDEs) with several delays...
DOI: 10.33899/csmj.2011.163638
Segment the Medical Images based on Contourlet Transformations
Khalil I. Al-Saif, Karam M. Abdullah
In this paper, we have studied the Normalized Cut algorithm to segment the medical images that was widely used in the last decade. And we based on Image in contourlet domain that supports rich...
DOI: 10.33899/csmj.2011.163649
Information Hiding Techniques Using Network Protocols
Manar Younis Kashmola, Ameera Bibo Sallo
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol...
DOI: 10.33899/csmj.2011.163650
New Variable Metric Algorithm by The Mean of 2nd Order Quasi-Newton Condition
Abbas Y. Al-Bayati, Runak M. Abdullah
In this paper a new class of Quasi-Newton update for solving unconstrained nonlinear optimization problem is proposed. In this work we suggested a new formula for the variable metric update with a...
DOI: 10.33899/csmj.2011.163639
Numerical Stability of Brusselator System
Saad A. Manaa, Rostam K. Saeed, Fadhil H. Easif
The numerical stability analysis of Brusselator system has been done in one and two dimensional space. For one dimension we studied the numerical stability for explicit and implicit (Crank-...
DOI: 10.33899/csmj.2011.163640
Hyper Secure Algorithm for Text
Melad jader saeed
Classical encryption methods depend on two basic encryption method, namely MONO ALPHABET and POLY ALPHABET. In this research, we developed a hybrid encryption algorithm to overcome the weaknesses...
DOI: 10.33899/csmj.2011.163651
On n - Regular Rings
Raida D. Mahmood, Mohammed Th. Youns
As a generalization of regular rings, that is a ring is called n-regular if for all . In this paper, we first give various properties of n-regular rings. Also, we study the relation between such...
DOI: 10.33899/csmj.2011.163628
Some Algebraic and Analytical Properties of Special Matrices
Laith K. Shaakir, Akram S. Mohamed, Nazar K. Hussein
In this work we present a subset of ( is the set of all matrices ) which we called the set of special matrices and denoted it by . We give some important properties of .
DOI: 10.33899/csmj.2011.163642
Design Educational Bag in Basics of Image Processing
Ghada Mohammad Tahir Qasim
The didactic bags which are programs designed to replace the teacher in a certain scientific field, are the modernist didactic means which proved great activity in the didactic process and due to...
DOI: 10.33899/csmj.2011.163652
Monotonicity of Some Functions Involving The Beta Function
Hanadi D. Saleem
In this short paper the monotonicity of functions involving the Beta function is considered to be study by using a similar method given in [2] and [4].
DOI: 10.33899/csmj.2011.163643
Intrusion Detection System Based on Neural Networks Using Bipolar Input with Bipolar Sigmoid Activation Function
Adel S. Issa, Adnan M. Abdulazeez
Vulnerabilities in common security components such as firewalls are inevitable. Intrusion Detection Systems (IDS) are used as another wall to protect computer systems and to identify corresponding...
DOI: 10.33899/csmj.2011.163644
Design and Build a Database Management System for Computer Science Department Students
Ryan Youssef Yaacoub, Muhammad Hashem Sultan
Student's system has been analyzed and A database was designed according to their registration, study and lectures attending , with full documentation to their degrees, the information of...
DOI: 10.33899/csmj.2011.163653
Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform
Shaimaa Sh. Mohammad
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has...
DOI: 10.33899/csmj.2011.163645
On the Basis Number of Some Special Graphs for Mycielski’s Graph
Ghassan T. Marougi, Raghad A. Mustafa
The basis number b(G) ,of a graph G is defined to be the least positive integer k such that G has a k-fold basis for its cycle space. In this research paper,we have studied the basis number of some...
DOI: 10.33899/csmj.2011.163654
Using Δ - Discriminate Method to Determine the Stability and Bifurcation of Chen Chaotic System
Saad Fawzi AL-Azzawi, Karam A. Abed
The aim of this paper to found that the stability and bifurcation of Chen System by using a new method which called - discriminate method as will as we found the stability at the second critical...
DOI: 10.33899/csmj.2011.163646
Hosoya Polynomials of The Width Distance of Some Cog-Special Graphs
Ahmed M. Ali, Tahir H. Ismail
In this paper, we give some definitions and properties of the width distance and find the Hosoya polynomials, Wiener indices, and the average distances of some special cog-graphs with respect to...
DOI: 10.33899/csmj.2011.163647
Building an Intelligent System to Distinguish Russian Printed Letters using Artificial Neural Networks
Jamal S. Majeed, Sura R. Sherif, Osama Y. Mohamed
In this research, an intelligent computer system is designed for recognizing printed Russian letters by extracting features of the letter by finding the Eigen values which then used for training...
DOI: 10.33899/csmj.2011.163655
Unsteady Flow to Viscous Thin Films on a Vertical Surface
Khidr M.S. Khidr, Hanin T. Jasim, Hikmat Mustafa
In this paper we have investigated the unsteady flow to thin films of an incompressible liquids with no inertia force, continuity equation and Nervier-Stokes equations are used to obtain the...
DOI: 10.33899/csmj.2011.163656
An Investigation for Steganalysis in Color Images
Samah F. Aziz, Ahmed S. Nori
With science developing and techniques used in Information hiding, there are another techniques wall together for Steganalysis. Steganography is considered as the new and the complementary system...
DOI: 10.33899/csmj.2011.163657
Design a Software Engineering CASE Tool (ERToOracle10g) to transform a graphical Entity Relationship model (ER model) to Oracle10g
Nada N. Saleem, Saad Ahmed Th.
CASE Tools play a significant role in the field of software engineering development processes where they are utilized in system modeling and analysis, in system design and in generating automatic...
DOI: 10.33899/csmj.2011.163658





