Volume 10 Issue 3

Published: 2013-09-15

Contents


Research Paper
On Simple Singular N-Flat Modules

Raida D. Mahmood, Dina A. Hadid

Let I be a right ideal of a ring R , then R/I is right N-flat module if and only if for each , there exists and a positive integer n such that and .In this paper, we first introduce and...

DOI: 10.33899/csmj.2013.163522

Pages: 13-20
Steganography based on Vector Quantization Technique

Ahmed S. Nori, Ansam Osamah

The present research was aimed to implement a new Steganographic algorithm for Images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure cover for data to...

DOI: 10.33899/csmj.2013.163532

Pages: 13-27
Two Modified QN-Algorithms for Solving Unconstrained Optimization Problems

Abbas Y. Al-Bayati, Basim A. Hassan

This paper presents two modified Quasi-Newton algorithms which are designed for solving nonlinear unconstrained optimization problems. These algorithms are based on different techniques namely:...

DOI: 10.33899/csmj.2013.163523

Pages: 21-28
On Generalized m-flat Modules

Zubayda M. Ibraheem, Maha F. Khalaf

Let I be a right (left) ideal of a ring R. Then R/I is a right (left) generalized m flat modules (GmF module) if and only if for each , there exist and a fixed positive integer m such that . We...

DOI: 10.33899/csmj.2013.163533

Pages: 29-35
New Three –Term CG-Method for Unconstrained Optimization

Ban A. Mitras, Nada F. Hassan

In this paper, we proposed a new three-term nonlinear Conjugate Gradient (CG) method for solving unconstrained optimization problems. The new three-term method generates decent direction with an...

DOI: 10.33899/csmj.2013.163524

Pages: 29-35
Application of Some Traditional Denoiseing Algorithms to Zoom-Out the Color Images

Hanan Hamid Ali

In this paper many algorithmswereapplied to" zoom out" the images, like the traditional algorithm (Linear Averaging) algorithm, then this algorithm was developed to a proposed algorithm (Block...

DOI: 10.33899/csmj.2010.163904

Pages: 37-46
Arabic Handwritten Signature Identification

Alaa Y. Taqa, Hanaa F. Mahmood

This paper proposes a new intelligent off-line Arabic handwritten signature identification and verification system based on texture analysis. The system uses the texture as feature and back...

DOI: 10.33899/csmj.2013.163525

Pages: 37-54
Digital Image Compression using Karhunen-Loève Transform

Ghada Thanoon Younes

In this research present the digital image compression using by Karhunen-Love Transform (KLT), by convert a color digital image to a gray square digital image, then select the no. of eigen values...

DOI: 10.33899/csmj.2013.163535

Pages: 47-59
The Detour Polynomials of the Corona of Graphs

Ali Aziz Ali, Gashaw A. Muhammed-Saleh

A new graph distance based polynomial, called detour polynomial, is introduced. The detour polynomial and the detour index of the corona of two connected disjoint graphs and are obtained in this...

DOI: 10.33899/csmj.2013.163526

Pages: 55-62
Chaotic Image Steganography using DCT and DWT

Nadia M. Mohammed

The researcherswas interestin the issue of security from long time ago even arrived tothe current age(the digital age), andbecause of the importance of thistopicand thechallengesin it, sothis...

DOI: 10.33899/csmj.2013.163536

Pages: 61-73
Analysis of Requirements Phase as a Step for Software Engineering Automation

Abdul Sattar M. Khidhir, Noor L. Shihab

Requirements engineering is the first phase of the software engineering process. This phase is the basis of other phases, so it is a very critical phase. Incomplete, ambiguous and misunderstanding...

DOI: 10.33899/csmj.2013.163527

Pages: 63-75
Encrypt and Hide Data in True Color Image Classes

Maha A. Hasso, Shahad A. Hasso, Ban Ghanem Maayouf

In a world that has evolved in which the information and means of transmission within the network of the whole world not to be a convenient way to keep that information to have some privacy or...

DOI: 10.33899/csmj.2013.163537

Pages: 75-89
Hosoya Polynomials of Generalized Vertex Identified and Edge Introducing Graphs

Ahmed M. Ali, Noor M. Dahash

The vertex identified and edge introducing graphs of two disjoint connected graphs are extended to n, , disjoint connected graphs. Hosoya polynomials and Wiener indices of such composite graphs are...

DOI: 10.33899/csmj.2013.163528

Pages: 77-88
Study of Dynamical Properties and Effective of a State u for Hyperchaotic Pan Systems

Saad Fawzi AL-Azzawi

In this paper, we propose a new four-dimensional continuous autonomous hyperchaotic system which is built by adding a nonlinear controller to a three- dimensional chaotic Pan system. The new system...

DOI: 10.33899/csmj.2013.163529

Pages: 89-99
Classification of Software Engineering Documents Based on Artificial Immune Systems

Nada N. Saleem, Rasha Gh. Saeed

Care about automated documents classification has increased since the appearance of the digital documents and the wide diffusion of Internet. In the 1990's, the computer performance has greatly...

DOI: 10.33899/csmj.2013.163538

Pages: 91-112
Numerical Solution for Non-linear Boussinesq System Using the Haar Wavelet Method

Ekhlass S. Al-Rawi, Ahmed F. Qasim

In this paper, an operational matrix of integrations based on the Haar wavelet method is applied for finding the numerical solution of non-linear third-order boussinesq system and the numerical...

DOI: 10.33899/csmj.2013.163530

Pages: 101-115
Neural Network Using for Extracting Hidden Information in Images

safwan hasoon, Farhad M. Khalifa

Steganography technique widely spread and varied. With the widening in using steganography, its misuse alarmists arisen. Thus steganalysis comes into sight to deter unwanted secret communications....

DOI: 10.33899/csmj.2013.163539

Pages: 113-130
Fourier Stability Analysis of Two Finite Element Schemes for Reaction-Diffusion System with Fast Reversible Reaction

Ann Jalal, Mohammed O. Al-Amr

In this paper, the stability analysis is performed on two Galerkin finite element schemes for solving reaction-diffusion system with fast reversible reaction. Fourier (Von Neumann) method is...

DOI: 10.33899/csmj.2013.163531

Pages: 117-128
Evaluation of Some Properties of Distributed Databases using Oracle

Alaa Faisal Saeed Al-Mukhtar

In this study, query processing efficiency of the distributed database in the relational database Oracle9i was examined and compared. Our test data is based on a (Customer Type Definition), which...

DOI: 10.33899/csmj.2013.163540

Pages: 131-142
Stability Study of the Orbits of Satellites around the Earth

Thair Y. Thanoon, Marwa Khaled fathy

In this research, we have studied of the motion of satellite orbits and rotation around the earth and that are subject to the laws of kepler and relationships associated with this motion, such as...

DOI: 10.33899/csmj.2013.163541

Pages: 143-156