Volume 10 Issue 3
Published: 2013-09-15
Contents
Research Paper
On Simple Singular N-Flat Modules
Raida D. Mahmood, Dina A. Hadid
Let I be a right ideal of a ring R , then R/I is right N-flat module if and only if for each , there exists and a positive integer n such that and .In this paper, we first introduce and...
DOI: 10.33899/csmj.2013.163522
Steganography based on Vector Quantization Technique
Ahmed S. Nori, Ansam Osamah
The present research was aimed to implement a new Steganographic algorithm for Images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure cover for data to...
DOI: 10.33899/csmj.2013.163532
Two Modified QN-Algorithms for Solving Unconstrained Optimization Problems
Abbas Y. Al-Bayati, Basim A. Hassan
This paper presents two modified Quasi-Newton algorithms which are designed for solving nonlinear unconstrained optimization problems. These algorithms are based on different techniques namely:...
DOI: 10.33899/csmj.2013.163523
On Generalized m-flat Modules
Zubayda M. Ibraheem, Maha F. Khalaf
Let I be a right (left) ideal of a ring R. Then R/I is a right (left) generalized m flat modules (GmF module) if and only if for each , there exist and a fixed positive integer m such that . We...
DOI: 10.33899/csmj.2013.163533
New Three –Term CG-Method for Unconstrained Optimization
Ban A. Mitras, Nada F. Hassan
In this paper, we proposed a new three-term nonlinear Conjugate Gradient (CG) method for solving unconstrained optimization problems. The new three-term method generates decent direction with an...
DOI: 10.33899/csmj.2013.163524
Application of Some Traditional Denoiseing Algorithms to Zoom-Out the Color Images
Hanan Hamid Ali
In this paper many algorithmswereapplied to" zoom out" the images, like the traditional algorithm (Linear Averaging) algorithm, then this algorithm was developed to a proposed algorithm (Block...
DOI: 10.33899/csmj.2010.163904
Arabic Handwritten Signature Identification
Alaa Y. Taqa, Hanaa F. Mahmood
This paper proposes a new intelligent off-line Arabic handwritten signature identification and verification system based on texture analysis. The system uses the texture as feature and back...
DOI: 10.33899/csmj.2013.163525
Digital Image Compression using Karhunen-Loève Transform
Ghada Thanoon Younes
In this research present the digital image compression using by Karhunen-Love Transform (KLT), by convert a color digital image to a gray square digital image, then select the no. of eigen values...
DOI: 10.33899/csmj.2013.163535
The Detour Polynomials of the Corona of Graphs
Ali Aziz Ali, Gashaw A. Muhammed-Saleh
A new graph distance based polynomial, called detour polynomial, is introduced. The detour polynomial and the detour index of the corona of two connected disjoint graphs and are obtained in this...
DOI: 10.33899/csmj.2013.163526
Chaotic Image Steganography using DCT and DWT
Nadia M. Mohammed
The researcherswas interestin the issue of security from long time ago even arrived tothe current age(the digital age), andbecause of the importance of thistopicand thechallengesin it, sothis...
DOI: 10.33899/csmj.2013.163536
Analysis of Requirements Phase as a Step for Software Engineering Automation
Abdul Sattar M. Khidhir, Noor L. Shihab
Requirements engineering is the first phase of the software engineering process. This phase is the basis of other phases, so it is a very critical phase. Incomplete, ambiguous and misunderstanding...
DOI: 10.33899/csmj.2013.163527
Encrypt and Hide Data in True Color Image Classes
Maha A. Hasso, Shahad A. Hasso, Ban Ghanem Maayouf
In a world that has evolved in which the information and means of transmission within the network of the whole world not to be a convenient way to keep that information to have some privacy or...
DOI: 10.33899/csmj.2013.163537
Hosoya Polynomials of Generalized Vertex Identified and Edge Introducing Graphs
Ahmed M. Ali, Noor M. Dahash
The vertex identified and edge introducing graphs of two disjoint connected graphs are extended to n, , disjoint connected graphs. Hosoya polynomials and Wiener indices of such composite graphs are...
DOI: 10.33899/csmj.2013.163528
Study of Dynamical Properties and Effective of a State u for Hyperchaotic Pan Systems
Saad Fawzi AL-Azzawi
In this paper, we propose a new four-dimensional continuous autonomous hyperchaotic system which is built by adding a nonlinear controller to a three- dimensional chaotic Pan system. The new system...
DOI: 10.33899/csmj.2013.163529
Classification of Software Engineering Documents Based on Artificial Immune Systems
Nada N. Saleem, Rasha Gh. Saeed
Care about automated documents classification has increased since the appearance of the digital documents and the wide diffusion of Internet. In the 1990's, the computer performance has greatly...
DOI: 10.33899/csmj.2013.163538
Numerical Solution for Non-linear Boussinesq System Using the Haar Wavelet Method
Ekhlass S. Al-Rawi, Ahmed F. Qasim
In this paper, an operational matrix of integrations based on the Haar wavelet method is applied for finding the numerical solution of non-linear third-order boussinesq system and the numerical...
DOI: 10.33899/csmj.2013.163530
Neural Network Using for Extracting Hidden Information in Images
safwan hasoon, Farhad M. Khalifa
Steganography technique widely spread and varied. With the widening in using steganography, its misuse alarmists arisen. Thus steganalysis comes into sight to deter unwanted secret communications....
DOI: 10.33899/csmj.2013.163539
Fourier Stability Analysis of Two Finite Element Schemes for Reaction-Diffusion System with Fast Reversible Reaction
Ann Jalal, Mohammed O. Al-Amr
In this paper, the stability analysis is performed on two Galerkin finite element schemes for solving reaction-diffusion system with fast reversible reaction. Fourier (Von Neumann) method is...
DOI: 10.33899/csmj.2013.163531
Evaluation of Some Properties of Distributed Databases using Oracle
Alaa Faisal Saeed Al-Mukhtar
In this study, query processing efficiency of the distributed database in the relational database Oracle9i was examined and compared. Our test data is based on a (Customer Type Definition), which...
DOI: 10.33899/csmj.2013.163540
Stability Study of the Orbits of Satellites around the Earth
Thair Y. Thanoon, Marwa Khaled fathy
In this research, we have studied of the motion of satellite orbits and rotation around the earth and that are subject to the laws of kepler and relationships associated with this motion, such as...
DOI: 10.33899/csmj.2013.163541





