Articles

A New Symmetric Rank One Algorithm for Unconstrained Optimization
Abbas Al-Bayati, Salah Shareef (Author)
December 2011 ,Pages 13-19

Abstract: In this paper, a new symmetric rank one for unconstrained optimization problems is presented. This new algorithm is used to solve symmetric and positive definite matrix. The new method is tested numerically by (7) nonlinear test functions and method is compared with the standard BFGS algorithm.             The new matrix used is symmetric and positive definite and it generates descent directions and satisfied QN-like condition.  

  PDF
P-Stability of Linear Multistep Methods for Delay Retarded Differential Equations with Several Delays
Abbas Al-Bayati, Ann Al-Sawoor, Reyadh Naoum (Author)
December 2011 ,Pages 21-33

Abstract: This paper modifies the numerical solution of initial value problems of the Delay Differential Equations (DDEs) by making it deals with Retarded Differential Equations (RDEs) with several delays     where  are positive constants,  and  denote given vector-valued functions. The stability behaviors of linear multistep method for RDEs is studied and it is proved that the linear multistep method is GP-stable if it is A-stable for Ordinary Differential Equations (ODEs).  

  PDF
New Variable Metric Algorithm by The Mean of 2nd Order Quasi-Newton Condition
Abbas Al-Bayati, Runak Abdullah (Author)
December 2011 ,Pages 35-41

Abstract: In this paper a new class of Quasi-Newton update for solving unconstrained nonlinear optimization problem is proposed. In this work we suggested a new formula for the variable metric update with  a new quasi-Newton condition used for the symmetric rank two formula. Finally, a numerical study is reported in which the performance of this new algorithm is compared to that of various members of the unmodified family. Numerical experiments indicate that this new algorithm is effective and superior to the standard BFGS and DFP algorithms, with respect to the number of functions evaluations (NOF) and number of iterations (NOI).  

  PDF
Numerical Stability of Brusselator System
Saad Manaa, Rostam Saeed, Fadhil Easif (Author)
December 2011 ,Pages 43-52

Abstract: The numerical stability analysis of Brusselator system has been done in one and two dimensional space. For one dimension we studied the numerical stability for explicit and implicit (Crank- Nicolson) methods and we found that explicit method for solving Brusselator system is stable under the conditions  , and While the implicit method is unconditionally stable. For two dimensional space we found that ADE method is stable under condition   , and , while ADI is unconditionally stable.  

  PDF
On n - Regular Rings
Raida Mahmood, Mohammed Youns (Author)
December 2011 ,Pages 53-59

Abstract: As a generalization of regular rings, that is a ring is called n-regular if  for all . In this paper, we first  give  various properties of n-regular rings. Also, we study the relation between such rings and reduced rings by adding some types of rings, such as NCI rings, and other types of rings.  

  PDF
Some Algebraic and Analytical Properties of Special Matrices
Laith Shaakir, Akram Mohamed, Nazar Hussein (Author)
December 2011 ,Pages 61-73

Abstract: In this work we present a subset of  (  is the set of all  matrices ) which we called the set of special matrices and denoted it by  . We give some important properties of  .  

  PDF
Monotonicity of Some Functions Involving The Beta Function
Hanadi Saleem (Author)
December 2011 ,Pages 75-77

Abstract: In this short paper the monotonicity of functions involving the Beta function is considered to be study by using a similar method given in [2] and [4].  

  PDF
Intrusion Detection System Based on Neural Networks Using Bipolar Input with Bipolar Sigmoid Activation Function
Adel Issa, Adnan Abdulazeez (Author)
December 2011 ,Pages 79-86

Abstract: Vulnerabilities in common security components such as firewalls are inevitable. Intrusion Detection Systems (IDS) are used as another wall to protect computer systems and to identify corresponding vulnerabilities. The purpose of this paper is to use Backpropagation algorithm for IDS by applying bipolar input “input is represented as (1, -1)”, and bipolar sigmoid activation function. The KDD Cup 99 dataset is used in this paper. Number of train dataset is 4947 connection records, and number of test dataset is 3117 connection records. The results of the proposed method show that the PSP is 88.32 and CPT equal to 0.286.  

  PDF
Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform
Shaimaa Mohammad (Author)
December 2011 ,Pages 87-97

Abstract: In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing. To increase the effective of this algorithm chaotic logistic map are used to select the embedding position in host chaotically which increase the security and make it hard to be detected, experimental result which be measured by using (Mean Square error, Peak signal to noise ratio , Signal to Noise Ratio, CORLLATION) has value (0.3195, 53.0867, 45.9152, 0.9998) respectively reflect the effective of this algorithm, the watermarked image has no noticeable change, some image processing operation such as(filter ,noise and compression) are used to test the robustness which measured by calculate similarity between extracted watermark after attack and the original one, Programming based on Matlab9.  

  PDF
Information Hiding Based on Chan-Vese Algorithm
Samia Sh. Lazar, Nadia M. Mohammed (Author)
December 2011 ,Pages 99-110

Abstract: The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. In addition the algorithm of this technique is implemented in Matlab.

  PDF
Using Δ - Discriminate Method to Determine the Stability and Bifurcation of Chen Chaotic System
Saad AL-Azzawi, Karam Abed (Author)
December 2011 ,Pages 111-122

Abstract: The aim of this paper to found that the stability and bifurcation of Chen System by using a new method which called - discriminate method as will as we found the stability at the second critical point by another method, and we showed that the new method depended on the roots to determent  the stability and bifurcation of this system while the previous methods depended on the parameters , also we showed the method which used to find the stability at the second critical point depended on the critical value  and parameter . Finally, we get the same previous results but easily method.    

  PDF
Hosoya Polynomials of The Width Distance of Some Cog-Special Graphs
Tahir Ismail, Ahmed Ali (Author)
December 2011 ,Pages 123-137

Abstract: In  this paper, we give some definitions and  properties of the width distance and find the Hosoya polynomials, Wiener indices, and the average distances of some special cog-graphs with respect  to the width distance.  

  PDF
Stability Analysis in Thin Liquid Film (Immobile Soap Film)
Rotina Al-Etewi, Zena Al-Nuamy (Author)
December 2011 ,Pages 13-21

Abstract: This research is dedicated for analyzing the stability of a system of flow equations for soap film that has opposed for disturbance, and this analysis was done by using Galerkin method which enable to find disturbance growth from its nonexistence after making the system linearization. It was shown through the results of analysis that these equations were in stable state when the real part of wave velocity (a)  is a negative quantity, and it is  unstable state when the real part of this velocity is a positive quantity, i.e. a < 0 we get stability and this happens when the distance (do) and the source (uo) in two similar signs and when a > 0 we get unstable state and this happens when do , uo  have two different  signs.  

  PDF
Segment the Medical Images based on Contourlet Transformations
Khalil Al-Saif, Karam Abdullah (Author)
December 2011 ,Pages 23-34

Abstract: In this paper, we have studied the Normalized Cut algorithm to segment the medical images that was widely used in the last decade. And we based on Image in contourlet domain that supports rich information in Low _ Low frequency. And a clear edges in High_ High frequency.             As motion above, we can replace the algorithm filters by the high frequency contourlet coefficient, and then the edges will be projected on the original image to obtain a segment to be studied independently.             When the proposed algorithm applied on the medical images after exchanging the previous filter by the contourlet coefficients, Adopted in additionto extract the properties of the selected segment to be recognized by human eyes.           

  PDF
Information Hiding Techniques Using Network Protocols
Manar Kashmola, Ameera Sallo (Author)
December 2011 ,Pages 35-50

Abstract: The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer  field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field.  The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.  

  PDF
Hyper Secure Algorithm for Text
Melad saeed (Author)
December 2011 ,Pages 51-65

Abstract: Classical encryption methods depend on two basic encryption method, namely MONO ALPHABET and POLY ALPHABET.             In this research, we developed a hybrid encryption algorithm to overcome the weaknesses in both methods and  employed  the basic methods  of themselves. The output  ciphertext is characterized  with the high security  when it does not give the expected results using the basics to break the code, namely, (adoptig the frequencies of the language used i.e. Frequency Analysis, besides Coincidence and Kasiski test).             The problem of  distributing the secret key has been also overcome by adopting a new technique to  hide the  key inside the encrypted text in a nearly proposed way. Experimental result has been demonstrated that it is difficult to determine  the used encryption method ,in this algorithm we used MATLAB.  

  PDF
Design Educational Bag in Basics of Image Processing
Ghada Tahir Qasim (Author)
December 2011 ,Pages 67-83

Abstract: The didactic bags which are programs designed to replace the teacher in a certain scientific field, are the modernist didactic means which proved great activity in the didactic process and due to the importance of the images processing field of computers, so It has been constructed in this paper on designing of didactic bag in the bases of the images processing field which is considered as one of the classification of computer imaging. The research deals with the images processing in that the idioms. It deals the most famous idioms of images processing. It also treats of some of the images folders shapes. It deals with parts of images processing in detail as well as giving instance to illustrate each of these parts. It deals with the associating process with the parts of the images processing in that digital filtration and mathematical rolling, besides it deals with the special commands in the images processing in some programming languages as Matlab language, c++ language and visual basic language with giving some instances. The paper also contains a show for some internet sites in order to give the opportunity to the user to increase his knowledge and expertise if he wishes to sight the internet sites.  

  PDF
Design and Build a Database Management System for Computer Science Department Students
Ryan Yaacoub, Muhammad Sultan (Author)
December 2011 ,Pages 85-104

Abstract: Student's system has been analyzed and A database was designed according to their registration, study and lectures attending , with full documentation to their degrees, the information of undergraduate study in computer science department students – University of Mosul are used as a case study. This research use two data models to represent the database first is the Entity-Relationship Model, second is the Relational Model, Microsoft Visual FoxPro 9.0 used to create the database which contain all the related tables, a numbers of important suitable windows and reports that matches the department's needs  are created also.  

  PDF
On the Basis Number of Some Special Graphs for Mycielski’s Graph
Ghassan Marougi, Raghad Mustafa (Author)
December 2011 ,Pages 105-124

Abstract: The basis number b(G) ,of a graph G is defined to be the least positive integer k such that G has a k-fold basis for it’s cycle space. In this research paper,we have studied the basis number of some special graphs for Mycielski’s graph .It is proved that      

  PDF
Building an Intelligent System to Distinguish Russian Printed Letters using Artificial Neural Networks
Jamal Majeed, Sura Sherif, Osama Mohamed (Author)
December 2011 ,Pages 125-141

Abstract: In this research, an intelligent computer system is designed for recognizing printed Russian letters by extracting features of the letter by finding the Eigen values which then used for training and testing the artificial neural network used in this work namely, Elman NN. This network is used as a tool for decision making. Data is entered using a flatbed scanner which results in high extensity, fineness and homogeneous BMP extension images. The programs are implemented by Matlab language, the software include image enhancement techniques, image segmentation, resize the segmented image and  features extraction dependent on Eigen values .These values are then used to train and test the Elman Neural Network. In this work the pass  ratio of recognition up to 90 % .  

  PDF
Unsteady Flow to Viscous Thin Films on a Vertical Surface
Khidr Khidr, Hanin Jasim, Hikmat Mustafa (Author)
December 2011 ,Pages 143-149

Abstract: In this paper we have investigated the unsteady flow to thin films of an incompressible liquids with no inertia force, continuity equation and Nervier-Stokes equations are used to obtain the equation that governs this type of flow, this equation is solved analytically to find the thickness of the film.  

  PDF
An Investigation for Steganalysis in Color Images
Samah Aziz, Ahmed Nori (Author)
December 2011 ,Pages 151-167

Abstract: With science developing and techniques used in Information hiding, there are another techniques wall together for Steganalysis. Steganography is considered as the new and the complementary system of Cryptography that took a long time in transferring secret and important messages through the networks Internet. Then there was the emergence of what complements Steganography as a science that analysis and discover the content of the secret messages and this science is Steganalysis. This study tackled and manifested the ideas of analysis processes that can be followed to interpret the secret messages and discovering them either by means of knowing about their existence only or the capability of extracting them in full. The work relied on two important technologies; the first is called the Support Vector Machine (SVM) and the second is called Fisher Linear Discriminator (FLD). The SVM technology has been used with the blind application idea while FLD has been used with the blind and non-blind application ideas using colored images which are PNG and BMP. Results proved the high efficiency of the two technologies in detecting the image that includes the secret messages and comparisons were varied between the two technologies in terms of detection rate, fault and the execution time.  

  PDF
Design a Software Engineering CASE Tool (ERToOracle10g) to transform a graphical Entity Relationship model (ER model) to Oracle10g
Nada Saleem, Saad Th. (Author)
December 2011 ,Pages 169-180

Abstract: CASE Tools play a significant role in the field of software engineering development processes where they are utilized in system modeling and analysis, in system design and in generating automatic software codes based on system design models. In this research the (ERToOracle10g) tool has been designed and implemented as a CASE Tool. Hence it is used to construct a data modeling using ER Model, then transforming the graphical model to (Oracle 10g) SQL instructions and executing it automatically inside an (Oracle 10g) server. XML has been used  to transform graphical ER model to SQL instructions. The graphical ER model includes symbols and shapes that are difficult to analyze or to directly generate SQL instructions. The graphical model is transformed to descriptive text using XML which is easy to analyze and transform to SQL instructions.  

  PDF