Articles

New low storage VM-algorithm for constrained optimization
Abbas Al-Bayati, Hamsa Chilmerane (Author)
September 2009 ,Pages 11-19

Abstract: In this paper a new low-storage VM-algorithm for constrained optimization is investigated both theoretically and experimentally. The new algorithm is based on both the well-known Fletcher's low storage algorithm which generates columns Z spanned on the gradient vectors g1, g2, ... gn  and the idea of both Buckley and LeNir of combined variable storage-conjugate gradient method. The well-known SUMT algorithm is adapted to implement the new idea. The new algorithm is very robust compared with the standard low-storage Fletcher algorithm and the standard SUMT algorithm which was designed for solving constrained problems, of the    numerical results of application very promising.  

  PDF
New conjugacy condition with pair-conjugate gradient methods for unconstrained optimization
Abbas Al-Bayati, Huda Ahmed (Author)
September 2009 ,Pages 21-35

Abstract: Conjugate gradient methods are wildly used for unconstrained optimization especially when the dimension is large. In this paper we propose a new kind of nonlinear conjugate gradient methods which on the study of Dai and Liao (2001), the new idea is how to use the pair conjugate gradient method with this study (new cojugacy condition) which consider an inexact line search scheme but reduce to the old one if the line search is exact. Convergence analysis for this new method is provided. Our numerical results show that this new methods is very efficient for the given ten test function compared with other methods.  

  PDF
A New Binary Mathematical Programming Problem Model for Mobile Communication
Abdul-Rahim Alharithi, Dana Mahmood (Author)
September 2009 ,Pages 37-47

Abstract: The aim of this study is to determine the number of base slatlons and  capacity of each base station to satisfy the increased traffic demand and serving all traffic demand areas with a sufficient number of base stations, which is using a minimum number of base stations in order to minimize the total cost.             The problem is formulated as a binary linear program ming problem, and is solved by a specific algorithm. For this reason, we have built a specific algorithm to solve the model, with programming this algorithm by using Microsoft Access using Visual Basic applications, which has ability to have a decision about any changes and fluctuations.             Advantages of the algorithm can obtain best (optimum) solution with least steps.             Computational results show that the proposed model is highly effective and it is applicable, as well.             For (30) candidate base stations and (15) TDAs, we have applied the model with low costs differ by (10 unit $) with satisfying the required demand for all TDAs.  

  PDF
On Idempotent Elements
Nazar Shuker, Alaa Hammodat (Author)
September 2009 ,Pages 49-56

Abstract: In this paper we study idempotent elements, we give some new properties of idempotent elements and provide some exam we also study central idempotent elements and orthogonal idempotent elements and give some new properties of such idempotent.          Finally we study special ring which satisfies the property   for all x in R and n is a positive integer, we represent such ring in termes of idempotent and nilpotent elements.  

  PDF
On GP- Ideals
Raida Mahmood, Shahla Khalil (Author)
September 2009 ,Pages 57-63

Abstract: In this work we give some new properties of GP- ideals as well as the relation between GP- ideals, - π regular and simple ring. Also we consider rings with every principal ideal are GP- ideals and establish relation between such rings with strongly  regular and local rings.  

  PDF
Solving Multi-Objective Complementary Programming Problem (MOCPP) by using Optimal Average
Najmaddin Sulaiman, Abdul-Qader Hamadamin (Author)
September 2009 ,Pages 65-79

Abstract: In this paper, we suggested an approach to solve Multi-Objective Complementary Programming Problem (MOCPP) by using optimal average (OAV). The computer application of algorithm also has been demonstrated by flow-chart and solving a numerical examples by using MATHLABR2006a, and shown results in tables.  

  PDF
Real Dynamics and Bifurcation of the Family
Salma Faris (Author)
September 2009 ,Pages 81-91

Abstract: The purpose of this work is to study the dynamics of the family of nonlinear functions ={ It is shown that the bifurcation in the dynamics of   occurs at the critical parameter value  

  PDF
Using Predictor-Corrector Methods for Numerical Solution of System of Non-linear Volterra Integral Equations of Second Kind
Borhan Jumaa, Abbas Taqi (Author)
September 2009 ,Pages 93-109

Abstract: The aim of this paper is solving system of non-linear Volterra integral equations of the second kind (NSVIEK2) numerically using Predictor-Corrector methods (P-CM). Two multistep methods (Adams-Bashforth, Adams-Moulton). Convergence and stability of the methods are proved and some examples are presented to illustrate the methods. Programs are written in matlab program version 7.0.  

  PDF
Enhancing Cost and Security of Arabic SMS Messages over Mobile Phone Network
Abdullah Abdullah (Author)
September 2009 ,Pages 111-127

Abstract: This paper investigates a novel algorithm for compressing and encrypting Arabic short text messages (SMS messages). Short text messages are used in cellular networks. Compression is required for saving the transmission energy or to use bandwidth in an efficient manner in addition to save the user money while the end-to-end effective encryption is required for security providence. This work succeeded to overcome small size limitation of the SMS message by changing Arabic characters coding from Unicode to Base64 coding scheme and developing a runt version of lossless Huffman coding scheme. Examples are shown where the application of the text compressor for short message services offering more than three times the capacity compared to a standard message.  

  PDF
The n-Wiener Polynomials of Straight Hexagonal Chains and Kt×Cr
Ali Ali, Haveen Ahmed (Author)
September 2009 ,Pages 129-139

Abstract: The n-Wiener polynomials of straight hexagonal chains and the Cartesian product of a complete graph Kr and a cycle Cr are obtained in this paper. The n-diameter and the n-Wiener index of each such graphs are also determined.  

  PDF
Stability Conditions for Flow Rate of Liquid Between Two Vessels
Thair Thanoon, Nagham Hana (Author)
September 2009 ,Pages 141-150

Abstract: In this paper we obtain the conditions under which the trivial solution is stable for the following  perturbed differential system :                     where _ constants.  which described the flow rate of liquid or gases between two vessels, we transform this differential system to auxiliary system which gives the stability conditions of solution by Perron principle, these conditions represent stability conditions for required differential system.      

  PDF
Image compression using Modified Fuzzy Adaptive Resonance Theory
Ielaf abdl-majjed (Author)
September 2009 ,Pages 151-160

Abstract: This research developed a software which can be used for image compression. This research proposes two methods: the first uses Joint Photographic Experts Group (JPEG), while the second uses artificial neural network (Modified Fuzzy Adaptive Resonance Theory (MFART)) algorithm. This software is applied on two types of images (jpeg and tiff). Several parameters in compression methods are tested, the results reveal that the MFART is better than the JPEG metod. The Root Mean Square Error (ERMS) for MFART method on jpeg image is equal 3.7 but it is equal to 26.09 when JPEG method implement on to the same image. MATLAB has been used in the  implementation of this software.  

  PDF
Stability Analysis of Unified Chaotic System
Saad AL-Azzawi (Author)
September 2009 ,Pages 161-171

Abstract: The aim of this paper is to find the stability of unified chaotic system through studying different systems. The unified chaotic system is divided into three systems by depending on the values of   , when    , the unified chaotic system becomes Lorenz system; when; it becomes L system, when    ; the unified chaotic system becomes Chen system. Investigations the stability analysis of these systems leads to the stability of the unified chaotic system.  

  PDF
On The Basis Number Of Semi-Strong Product Of With Some Special Graphs
Ghassan Marougi (Author)
September 2009 ,Pages 173-181

Abstract: The basis number, b(G) ,of a graph G is defined to be the smallest positive integer  k such that G has a k-fold basis for its cycle space. We investigate the basis number of semi-strong product of  with a path, a cycle, a star, a wheel and a complete graph.  

  PDF
Comparison between the Heun's and Haar Wavelet Methods for solution Differential-Algebraic Equations (DAEs)
Abdulghafor Al-Rozbayani, Ahmed Qasem (Author)
September 2009 ,Pages 183-196

Abstract: In this paper, We solved the system of differential-algebraic equation (DAEs) of index one numerically with Heun's method and operational matrices of Haar wavelet method, When we compared the results of the two methods with the exact solution, show that the operational matrices of Haar wavelet method is more efficiency and it's numerical results near to the exact solution more than the Heun's method, and the solution accuracy of this method is increasing and the error decreases when the number of mesh points and size of matrices increase.  

  PDF
An Algorithm for the Best Way Connection among Cell-Phone Towers Using Feedforward Neural Network
Kais Ibraheem, Thamir Jarjis, Yahya Ibrahim (Author)
September 2009 ,Pages 197-209

Abstract: A new approach for mobile radio towers is presented in this paper. The use of feed-forward artificial neural network makes it possible to overcome some important disadvantages of previous random distribution of the towers. Our sample implementation is based upon the coordinates of a virtual cell phone towers distributed in Mosul city. The results show that the proposed algorithm is sufficiently accurate for use in planning mobile towers distribution system.  

  PDF
Off-line Recognition of Unconstrained Handwritten Numerals Using Fuzzy Hough Transform
Mohammed Khedher, Ghayda Al-Talib, Shayma Al mashhadany (Author)
September 2009 ,Pages 211-226

Abstract: A fuzzy system for handwritten numerals recognition using a fuzzy Hough transform technique is presented. The system is an off-line system since the data processed was written before the time of recognition. A data base of 480 patterns of unconstrained (free) handwritten numerals was used in the proposed system. Membership values are determined as fuzzy sets which are defined on the standard Hough transform vector. Manhattan distance measurement has been used to measure the similarity of an input feature vector to a number of numeral pattern classes. The overall recognition accuracy of the system for the ten numerals is 95%.  

  PDF
New Hybrid Quasi-Newton Algorithms for Large Scale Optimization
Abbas Al-Bayati, Sawsan Ismail (Author)
September 2009 ,Pages 11-24

Abstract: Two new hybrid algorithms have been suggested in this paper, the first one utilizes four formula of self-scaling update matrix was used. The matrix is selected according to Buckley method in each step. The new algorithm has been compared with BFGS standard algorithm by means of (10) multi-dimensional standard functions. As for the second new hybrid algorithm, a new method is used to test the conjugate coefficient (β) which consists of Hestenes Stiefel (HS) and Dai and yuan (DY). Then it is compared with BFGS and PCG algorithms, which uses BFGS update, by means of (10) multi-dimesional standard functions.             Numerical results in general indicates the efficiency of the algorithms proposed in this paper by using this number of non-linear functions in this domain.  

  PDF
Stability Analysis for Steady State Solutions of Burger Equation
Saad Manna, Badran Salem (Author)
September 2009 ,Pages 25-36

Abstract: The Stability Analysis of Steady State Solution of Burger equation by using Fourier mode Stability analysis in two cases has been considered , the first one when the amplitude is constant and the second one when the amplitude is variable . In the first case the steady state solution is always stable and the second case is conditionally stable . In the second case the comparison between the analytical solution and numerical solution of Galerkin technique are the same.  

  PDF
w-Wiener polynomials of Width Distance for Cartesian Product K2 with Cycle and Wheel
Ali Ali, Asma Aziz (Author)
September 2009 ,Pages 37-55

Abstract: The w-Wiener polynomials of the cartesian product of K2 with a cycle  Ct  and with a wheel Wt are obtained in this paper , in which  w does not exceed the connectivity of the product graph . The diameter and Wiener index with respect to the width distance -w  for K2×Ct   and K2×Wt are also obtained .  

  PDF
Enhance Fingerprint Image by Using Genetic Algorithms
Ban Mitras, Daliya Abdullah (Author)
September 2009 ,Pages 57-73

Abstract: In this paper, an algorithm is proposed to enhance fingerprint image which includes in one of its steps a smoothing process in which the suggested genetic algorithms by Mitras and Anwar in 2007 which used  image smooth filters in both spatial and frequency domain will be employed to know their efficiency in enhancing and regaining the damaged sides of the fingerprint image to remove two types of noise, first one deals with noise added to the image, and the second one the noise already found in the image. Then histogram technique is used to enhance the fingerprint image.  

  PDF
Image Compression Based on Artificial Intelligent Techniques
Shahbaa Khaleel, Baydaa Khaleel, Alaa khaleel (Author)
September 2009 ,Pages 75-109

Abstract: This research present four methods to compress digital images using clustering based on artificial intelligent techniques that include neural network, fuzzy logic and hybrid between them. To enhance the performance of the compression system, the first method was developed in two types (k-means 1 dimension run length encoding km1D, k-means 2 dimension run length encoding km2D) by applying traditional clustering algorithm k-means on color and gray level images and then apply compression algorithm RLE in one and two dimension by zigzag scanning to obtain compressed image. The second method (fuzzy c-mean 1dimension run length encoding fcm1D, fuzzy c-mean 2dimension run length encoding fcm2D) used fuzzy c-mean to apply clustering operation and then compression. The third method (kohonen 1 dimension run length encoding Koh1D, kohonen 2dimension run length encoding Koh2D) used kohonen neural network for clustering image and then used RLE. The fourth developed method (fuzzy kohonen 1dimension run length encoding fKoh1D, fuzzy kohonen 2dimension run length encoding fKoh2D) based on hybrid kohonen neural network and fuzzy logic i.e fuzzy kohonen network which is recognized as the best method among the four methods. The four compression methods that are implemented in this research are efficient when applied on gray level and color images.  

  PDF
Stream Cipher Using Genetic Algorithm
Melad saeed (Author)
September 2009 ,Pages 111-126

Abstract: The research tackles newly suggested method  in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key other wise,Genetic Algorithm (GA) are used to produce the key stream. The proposed method used new structure style to hide the encrypted key withen the text. In addition simple hash function is used to check the integrity of the empeded encrypted key.  

  PDF
Evaluation of Electrons Energy Distribution Function by Fuzzy Logic
Nabhan Hamdon (Author)
September 2009 ,Pages 127-144

Abstract: Evaluation of a maxwellian Electrons Energy Distribution Function (EEDF) in plasma glow discharge in air has been done. It includes the design of computerized system which depends on one of the intelligent techniques (Fuzzy logic). Their input and output consists of linguistic variables which describe the fundamental parameters (Energy, Pressure, Discharge current) of glow discharge process in different glow discharge regions (Cathode fall region, positive column region). It is suggested in this study that three different types of Gaussian membership function in different forms for each variable. The results seem to be compatible with other published researches, making use of the MATLAB scientific software version (R2006a).  

  PDF