Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
On SNF-rings , I
13
18
EN
Raida
D.
Mahmood
College of Computer Sciences and Mathematics
University of Mosul, Mosul, Iraq
raida.1961@uomosul.edu.iq
Akram
S.
M.
Department of Mathematics,
College of Computer Science and Mathematics
University of Tikrit, IRAQ
akr_tel@tu.edu.iq
10.33899/csmj.2014.163727
A ring is called right SNF-rings if every simple right R-module is N-flat . In this paper , we give some conditions which are sufficient or equivalent for a right SNF-ring to be n-regular (reduced) .It is shown that
1- If is a GW-ideal of R for every . then ,is reduced if and only if is right SNF-ring.
2- If is an reversible, then is regular if and only if is right GQ-injective and SSNF-ring .
SNF-rings,GW-ideal,reversible
https://csmj.mosuljournals.com/article_163727.html
https://csmj.mosuljournals.com/article_163727_607443aea02af03bb0b0e5263f2b7b6c.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Classification of Zero Divisor Graphs of Commutative Rings of Degrees 11,12 and 13
19
24
EN
Nazar
H.
Shuker
College of Computer Science and Mathematics
University of Mosul, Mosul, Iraq
nazarh_2013@yahoo.com
Husam
Q.
Mohammad
College of Computer Sciences and Mathematics
University of Mosul, Mosul, Iraq
husam_alsabawi@yahoo.com
10.33899/csmj.2014.163728
In 2005 Wang investigated the zero divisor graphs of degrees 5,6,9 and 10. In 2012 Shuker and Mohammad investigated the zero divisor graphs of degrees 7 and 8. In this paper, we consider zero divisor graphs of commutative rings of degrees 11, 12 and 13.
Zero-divisor,Ring,Zero-divisor graph
https://csmj.mosuljournals.com/article_163728.html
https://csmj.mosuljournals.com/article_163728_64864697f4528ab559f2f686d836de28.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
A Modified Class of Conjugate Gradient Algorithms Based on Quadratic Model for Nonlinear Unconstrained Optimization
25
37
EN
Basim
A.
Hassan
College of Computer Sciences and Mathematics
University of Mosul, Mosul, Iraq
basimabas39@gmial.com
Hameed
M.
Sadiq
Department of Mathematics,
College of Computer Science and Mathematics
University of Mosul, IRAQ
10.33899/csmj.2014.163729
In this paper, we have investigated a new class of conjugate gradient algorithms for unconstrained non-linear optimization which are based on the quadratic model. Some theoretical results are investigated which are sufficient descent and ensure the local convergence of the new proposed algorithms. Numerical results show that the proposed algorithms are effective by comparing with the Polak and Ribiere algorithm.
Conjugate Gradient,Quadratic Model
https://csmj.mosuljournals.com/article_163729.html
https://csmj.mosuljournals.com/article_163729_4070b8bf3c58e15113614b438bbb341a.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Conjugate Gradient Algorithm Based on Aitken's Process for Training Neural Networks
39
51
EN
Khalil
K.
Abbo
College of Computer Science and Mathematics
University of Mosul, IRAQ
kh_196538@yahoo.com
Hind
H.
Mohammed
College of Computer Science and Mathematics
University of Mosul, IRAQ
hinmath80@gmail.com
10.33899/csmj.2014.163730
Conjugate gradient methods constitute excellent neural network training methods, because of their simplicity, numerical efficiency and their very low memory requirements. It is well-known that the procedure of training a neural network is highly consistent with unconstrained optimization theory and many attempts have been made to speed up this process. In particular, various algorithms motivated from numerical optimization theory have been applied for accelerating neural network training. In this paper, we propose a conjugate gradient neural network training algorithm by using Aitken's process which guarantees sufficient descent with Wolfe line search. Moreover, we establish that our proposed method is globally convergent for general functions under the strong Wolfe conditions. In the experimental results, we compared the behavior of our proposed method(NACG) with well- known methods in this field.
Artificial neural front networks,Education algorithms,Aitken method,Conjugate gradient algorithms
https://csmj.mosuljournals.com/article_163730.html
https://csmj.mosuljournals.com/article_163730_c9d098b427ff296b1bdb6af9263d13ea.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Measuring Of Data Base Performance Using Oracle
53
67
EN
Heba
Abdul-Razzak
Raoof
College of Comp. Sc. and Mathematics
University of Mosul
Firas
Mahmoud
Mustafa
College of engineering
University of Mosul
10.33899/csmj.2014.163731
Due to the tremendous increase in the manufacturing of computer and producing high speed and performance computers, it was very important to find new methods for distinguishing its efficiency, performance and characteristics.
Optimization method can be defined as a process of choosing the most efficient way to execute DML statements such as (select, insert, update and delete).
In this research, performance efficiency of two different computers specifications by using Oracle system (9i) has been measured, in addition to distinguishing the performance between these two computers, on different data sizes (1000, 5000, 80000,300000 and 600000 records). (SQL) as tools for any comparison can be achieved by the statistical performance parameters (Cpu time , Logical block read ,physical block read, physical block write, Process Global Area memory, Execution time). Update command effect on the parameters Cpu-time, logic_read, phy_read, Phy_Write was higher than select command specially at record number (600000) for both computers. Also, Values of these parameters increased by increasing data size (number of records). The parameters (PGA memory in use, exe_time) gave ununiform results by increasing data size.
The effect of selection and update commands in computer1 on (Cpu_time, logic_read, phy_read, Phy_Write) parameters values were significantly higher compared to computer2 . While, the values of (PGA memory in use, exe_time) parameters in computer2 for both select and update commands were higher compared with computer1, but it was not significant.
Oracle system (9i),some measurement methods
https://csmj.mosuljournals.com/article_163731.html
https://csmj.mosuljournals.com/article_163731_cf6cd4a4feccaa66bd92af9b9fe0be58.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Numerical Solution of Allen – Cahn Equation by Adomian Decomposition Method
69
79
EN
Abdulghafor
M.
Al-Rozbayani
Faculty of Science, University of Zakho, Iraq
abdulghafor_rozbayani@uomosul.edu.iq
10.33899/csmj.2014.163732
In this paper, Adomian Decomposition Method with Adomian polynomials are applied to solve Allen - Cahn equation with the initial condition only, also DuFort-Frankel method is applied with the initial and boundary conditions. The numerical results that are obtained by the Adomian decomposition method have been compared with the exact solution of the equation shown that it is more efficient than the DuFort-Frankel method, that is illustrated through the tables and Figures.
Allen – Cahn (AC) equation,Adomian decomposition method (ADM),DuFort-Frankel method (DFM)
https://csmj.mosuljournals.com/article_163732.html
https://csmj.mosuljournals.com/article_163732_01587bb37834eef7b0abd843da37720d.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Studying the Stability of a Non-linear Autoregressive Model (Polynomial with Hyperbolic Cosine Function)
81
91
EN
Abdulghafoor
Gasim
Salim
College of Computer Sciences and Mathematics
University of Mosul, Mosul, Iraq
drabdul_salim@uomosul.edu.iq
Anas
Salim
Youns Abdullah
College of Basic Education
University of Mosul,
10.33899/csmj.2014.163733
In this paper we study the statistical properties of one of a non-linear autoregressive model with hyperbolic triangle function(polynomial with hyperbolic cosinefunction)by using the local linearization approximation method to find the stability of the model (singular point and its stability conditions and the stability of limit cycle).Where we started by the model of lower order (first and second and third order) and generalized the idea, and we tried to apply these theory results by using some of examples to explain one of important truth that says (if the model has unstable singular point, then it, maybe, has a stable limit cycle).
Non-linear time series model,Non-linear random vibration,Autoregressive model,limit cycle,Singular point,stability
https://csmj.mosuljournals.com/article_163733.html
https://csmj.mosuljournals.com/article_163733_7623b3b2c177ce7e360977d54a170a5c.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
On Local Rings
93
97
EN
Zubayda
M.
Ibraheem
College of Computer Sciences and Mathematics
University of Mosul, Mosul, Iraq
zubaida_almulla@yahoo.com
Anees
A.
Fthee
Department of Mathematics,
College of Computer Science and Mathematics
University of Mosul, IRAQ
10.33899/csmj.2014.163734
A ring R is called local ring if it has exactly one maximal ideal. In this paper, we introduce some characterization and basic properties of this ring. Also, we studied the relation between local rings and Von Neumann regular rings and strongly regular rings.
local,Von Neumann regular and strongly regular rings
https://csmj.mosuljournals.com/article_163734.html
https://csmj.mosuljournals.com/article_163734_5918040e97a74ae60df25949d4144918.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Image Clustering based on Artificial Intelligence Techniques
99
112
EN
Baydaa
Ibraheem
Khaleel
College of Computer Science and Mathematics
University of Mosul
baydaa_ibraheem@yahoo.com
10.33899/csmj.2014.163735
Clustering has been widely used in data analysis and pattern recognition and classification. The objective of cluster analysis is the classification of objects according to similarities among them, and organizing of data into groups. There are several algorithms for clustering large data sets or streaming data sets, Their aims are to organize a collection of data items into clusters. These such items are more similar to each other within a cluster, and different than they are in the other clusters. We have take the advantage of classification abilities of Artificial Intelligence Techniques (AITs) to classify images data set into a number of clusters. The Gath-Geva (GG) fuzzy clustering algorithm, Artificial Bee Colony algorithm(ABC), Radial Basis Function Network(RBF), and then combined Gath-Geva algorithm with (RBF) algorithm to produce Fuzzy RBF (FRBF) method were applied using images data set to classify this data set into a number of clusters (classes). Each cluster will contain data set with most similarity in the same cluster and most dissimilarity with the different clusters. We compute the classification rate, and false rate on this data set. Finally we make comparisons between results obtained after applying these algorithms on this images data set.TheFRBF is better than the other three methods that applied in this research such as G-G, ABC, RBF, because the FRBF was obtained higher classification rate in testing state equal (96.8571) and low false alarm equal(3.1429).
Gath-Geva(GG) fuzzy clustering algorithm,Artificial Bee Colony algorithm (ABC),Radial Basis Function (RBF) Neural Network,Fuzzy RBF (FRBF)
https://csmj.mosuljournals.com/article_163735.html
https://csmj.mosuljournals.com/article_163735_bfebb4685cd29b0f53bbb4a595a0178b.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Using DNA to Encode Text Files
13
23
EN
Yassin
H.
Ismail
College of Computer Science and Mathematics
University of Mosul, Iraq
Najla
B.
Ibrahim
College of Computer Science and Mathematics
University of Mosul, Iraq
10.33899/csmj.2014.163736
Modern studies focused on Deoxyribonucleic acid (DNA) because that DNA have several important features including the random nature of the sequence of nitrogenous bases consisting the acid and large storage capability of the information that led to it’s usage in the field of encryption where the appearance of a new branch which is encryption of DNA . This research provided a new method to encrypt text files using DNA were building a set of coding tables and using them to obtain the cipher text in DNA form , also used a set of transposition cipher methods for the purpose of increasing the security of the resulted cipher text .
DNA,Encode
https://csmj.mosuljournals.com/article_163736.html
https://csmj.mosuljournals.com/article_163736_556cebc3f43e6d9bfbd7357886c4ed3e.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Hybridization of a hidden Markov model using Elman neural network with application
25
42
EN
Omar
Saber
Qasim
College of Computer Science and Mathematics
University of Mosul, Mosul, Iraq
omar.saber@uomosul.edu.iq
10.33899/csmj.2014.163737
This research aims to improve the performance of the work of hidden Markov model, which is limited to the positive integers as input, and through the use of Elman artificial neural network that have the ability to accept all types of data in the input space. The proposed model has proved that it is highly efficient in the classification of osteoporosis data compared with Elman artificial neural network on the one hand and the hidden Markov model on the other.
Pattern recognition,Elman neural network,hidden Markov model
https://csmj.mosuljournals.com/article_163737.html
https://csmj.mosuljournals.com/article_163737_82280a6d110563e9b8653ae64f9cca35.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Incomplete (rq-q+r- ɛ , r)-arcs and minimal {ℓ,t}-Blocking set in PG(2,q)
43
60
EN
Nada
Yassen Kasm
Yahya
0000-0002-1354-4758
University of Mosul/College of Education for Pure Science/Department of Mathematics
drnadaqasim1@gmail.com
Hiba
suhil
najem
College of Education for pure sciences
University of Mosul
10.33899/csmj.2014.163738
We proved that(rq-q+r-ɛ,r)-arcs is incomplete by using minimal {ℓ,t}-Blocking set in projective plane PG(2,q)and we found a new condition for ɛ is ɛ ≥-A(r-1)2+B(r-1)-C and A,B,C is a constant which is not get previously in studies which is search in finding ɛ for incomplete (rq-q+r-ɛ,r)-arcs ,for value 2≤r≤ 4 where q is prime for values 11≤q≤ 31 in addition to q=16.
incomplete (rq-q+r-ɛ,r)-arcs,minimal{ℓ,t}-Blocking set,t-Blocking set,Projective Plane PG(2,q)
https://csmj.mosuljournals.com/article_163738.html
https://csmj.mosuljournals.com/article_163738_dd2e3e9bf3663d65ae3255e1266f1371.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Building an electronic documentation system for the Graduate Studies Division using Distributed databases
61
80
EN
Nather
Muhammad
Qiddo
Computer and Internet Center
Mosul University
Raed
A. H.
Al-Dabbagh
College of Administration and Economics
Mosul University
10.33899/csmj.2014.163739
This research aims to build a system for electronic documentation for the unit of graduate studies, which is used for managing electronic documents (official books, attachments, and instructions). The system was characterized by the possibility of participating electronic documents between administrative units and scientific departments in the college through the use of distributed database management system (Oracle), as well as the use of multimedia databases for dealing with images and (pdf) files, which represent the instruction manual for graduate work.
System have been analyzed and identify entities and its attributes as well as the relationships between these entities, this model of entities and relationships was used to represent the database, and then convert the model into standard formats relations. Oracle 10g language was used to design distributed database. Finally, the Proposed model was applied to real data obtained from graduate unit in the college, and showed its efficiency in the management of data and official documents used.
Electronic Documentation,Distributed Database,Oracle Language,Multimedia Database
https://csmj.mosuljournals.com/article_163739.html
https://csmj.mosuljournals.com/article_163739_942e475c1724db9317dd42d540c93c7d.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Application of Chaotic Neural Network for Authentication using the Database
81
95
EN
Ammar
Thaher
Yaseen Abd Alazeez
College of Computer Science and Mathematics
University of Mosul, Mosul, Iraq
ammarthaher@yahoo.com
10.33899/csmj.2014.163740
In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding by entering values to the artificial neural network for training as well as hide in the picture, beside use the database for storage and retrieval information and increase the secret system. Through the overlap between the results of stages encryption and hide and artificial neural network algorithm was obtained exciting new strength from where you can not detect secret text only after obtaining random values of the chaotic algorithm and information about neural network algorithm as well as algorithm of work.
neural network,security,Database,authentication
https://csmj.mosuljournals.com/article_163740.html
https://csmj.mosuljournals.com/article_163740_323461c74952656012fb223416733cf6.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Textures Recognition using Elman Neural Network
97
108
EN
Fawziya
Mahmood
Ramo
College of Computer Science and Mathematics
University of Mosul, Mosul, Iraq
fawziya.ramoo@uomosul.edu.iq
Alaa
Anwr
Mohamed
College of computer science and mathematics
University of Mosul, Iraq
10.33899/csmj.2014.163741
In this research building system to recognition texture images using artificial neural networks. The system consists of two phases: phase extraction important feature of each texture by using an algorithm Principal Components Analysis (PCA) and recognition phase which recognize these feature by using Elman network were trained network on a number of various texture models down to the steady-state network and then test the network by input samples of textures. The experiments show that the method achieves high performance and produces 92% recognition rate.
Pattern recognition,neural network,feature extraction,Texture images
https://csmj.mosuljournals.com/article_163741.html
https://csmj.mosuljournals.com/article_163741_14867d1bc2137115e20c9f47b6584b47.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Architecture Design of 2-D Discrete Wavelet Transformation Algorithm using Field Programmable Gate Array (FPGA)
109
123
EN
Maha
A.
Hasso
College of Computer Science and Mathematics
University of Mosul, Mosul, Iraq
Sahla
A.
Ali
College of Computer Science and Mathematics
University of Mosul, Mosul, Iraq
10.33899/csmj.2014.163742
In this paper an architecture has been proposed for the 2-D Discrete Wavelet Transform (DWT) and the Inverse Discrete Wavelet Transform (IDWT) based on the Convolution method of the Daubechies 5/3-tap Biorthogonal filter bank in the Algorithm transformto image processing, and implementation it on the FPGA (Field Programmable Gate Array) using VHDL, for benefiting from implementation advantages of these Hardware and save run-time. The processing results proved speed and Efficiency of the proposed architecture, where the employed number of slices is less. So it result to Frequency higher and less run-time.The type of the FPGA based in this paper is Xilinx XC3S500E Spartan-3E using Xilinx ISE 9.2i.
2-D Discrete Wavelet Transformation,Field Programmable Gate Array(FPGA)
https://csmj.mosuljournals.com/article_163742.html
https://csmj.mosuljournals.com/article_163742_dc126d46c01eee8af9a9359f9d77bbe0.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Isolated Arabic Digit Recognition Using Genetic Algorithm
125
142
EN
Yusra
Faisal
Al-Irhaim
College of Computer Sciences and Mathematics
University of Mosul
yusrafaisalcs@uomosul.edu.iq
Ali
Insaf
Jasim
College of Computer Sciences and Mathematics
University of Mosul
10.33899/csmj.2014.163743
This study aims at constructing an intelligent system for recognizing the single Arabic numbers. It consists of two basic stages: the stage of features extraction and the stage of recognition. In the first stage, the technology of (Mel-Frequency cestrum coefficient (MFCC)) was employed. But in the second stage, the genetic algorithm was used.
The results of the test showed that words recognition percentage was (100%) for the words used with training, and it was (97%) for the words used with no training. The proposed system was constructed using the MatLab version (0.7) program, and the data used in the system are the following numbers: (0, 1, 2, 3, 4, 5, 6, 7, 8 and 9). Also, six speakers (four males and two females) performed the voice recording.
Speech recognition,Arabic digits,Genetic algorithms
https://csmj.mosuljournals.com/article_163743.html
https://csmj.mosuljournals.com/article_163743_e44c5376b2e4539704f77f21816d2a64.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Distinguish of Fingerprint Based on Artificial Neural Networks
143
162
EN
Zahraa
Maen
Al-Qattanz
College of Computer Sciences and Mathematics
University of Mosul, Mosul, Iraq
10.33899/csmj.2014.163744
In this research use one of artificial intelligence techniques which is artificial neural networks was used to distinguish fingerprint from a range of fingerprints belong to a unified database, based on a set of properties to the texture of image and which are extracted and analyzed using co-occurrence matrix (Event), These properties are (contrast ,correlation, determined, homogeneity), and after extracting properties, a combination of neural networks (Cascade Neural Network CNN and Radial Basis Functions netwoek RBFN and Elman Neural Network ENN) used to distinguish fingerprint, and the results of training 100% for the three networks after being trained on the network (18) sample where each person(3)samples.
Network efficiency was measured in recognition by using scale (training rate) and scale (recognition rate RR) for comparison between these networks to see the best network in the recognition.
fingerprint,artificial neural networks
https://csmj.mosuljournals.com/article_163744.html
https://csmj.mosuljournals.com/article_163744_31d968e1caf46c6cc6570bb88ad2027c.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
The Basis Number of symmetric Difference of K2 With Some Special Graphs
163
177
EN
Ghassan
Toubia
Marougi
Collge of Computers Sciences and Mathematics
University of Mousl , Iraq
toubiaghassan@yahoo.com
Ahmed
Mohammed
Ali
Collage of Computers Sciences and Mathematics
University of Mosul , Iraq
ahmed_math79@yahoo.com
Rasha
Sallal
Hasan
Collage of Computers Sciences and Mathematics
University of Mosul , Iraq
rshsal@yahoo.com
10.33899/csmj.2014.163745
This research aims to account the basis number of symmetric difference of K<sub>2</sub> with some special graphs such as a saw graph, a cog –graphs, a fan graph and a wheel graph.
symmetric difference,saw graph,cog –graphs,fan graph,wheel graph
https://csmj.mosuljournals.com/article_163745.html
https://csmj.mosuljournals.com/article_163745_91a75fba3db1153a4465f99784ea3766.pdf
Mosul University
AL-Rafidain Journal of Computer Sciences and Mathematics
1815-4816
2311-7990
11
1
2014
07
01
Selection and Prioritization of Test Cases by using Bees Colony
179
201
EN
Shahbaa
I.
Khaleel
College of Computer Sciences and Mathematics
University of Mosul
shahbaaibrkh@uomosul.edu.iq
Ragad
waleed
khaled
College of Computer Sciences and Mathematics
University of Mosul
10.33899/csmj.2014.163746
In this research, the bees swarm intelligence was studied to appointment it to serve software engineering. And that was performed through using Artificial Bees Colony ABC Algorithm in selection of test cases for the software written by C++ language in an automatic way since to enable the corporation which develops the software to save time, effort and costs that required for testing phase and regression testing activity, which is always evaluated by 50% of the product cost. The proposed work can reduce test cases that are used in the tests of software and in regression testing activity ,also will make prioritization to the test cases, that are produced by the best selection process, by using Greedy Algorithm and Genetic Algorithm. the proposed work was applied practically on some programs – that differ in number of lines of code-.the result that appeared reduce number of test cases and make test cases in certain ordering that assists testing and regression testing for the software in safe mode and short time .
swarm intelligence,Artificial Bees Colony,test cases,prioritization,Regression Testing Activity
https://csmj.mosuljournals.com/article_163746.html
https://csmj.mosuljournals.com/article_163746_b95a8cf4a4196f0923acd90bebad52ab.pdf