Articles

Explicit- Implicit Runge-Kutta Methods to Solve the System of Nonlinear PPDEs in Two Dimensions
Abbas Al-Bayati, Saad Manaa, Abdulghafor Al-Rozbayani (Author)
July 2012 ,Pages 13-21

Abstract: In this paper, we will find the numerical solution of Gray-Scott model in two dimensions space, this method is a system of non-linear parabolic partial differential equations. Then transforming the original model (system of non-linear PPDEs), by using the method of lines to a system of ODEs. Therefore we used Runge-Kutta methods (Explicit RK method and Implicit RK method) to find the numerical solutions of the new systems, and we compared between these methods, we saw that the numerical results of IRK methods is more accurate than the numerical results of ERK method.  

  PDF
Controlling and Protecting Windows Applications by Analyzing and Manipulating PE File Format
Rawaa Qasha, Zaid Monther (Author)
July 2012 ,Pages 23-33

Abstract: PE (Portable Executable) is the native file format of Windows32. Analyzing and manipulating the PE file gives valuable insights into the structure and work of Windows. This research includes analysis the components of Windows executable files as a structure and defined values, to provide the capability of protection and controlling Windows programs by applying specified modifications that can be undid on PE specific value to stop the program from being executed by unwanted user. Also it includes analyzing the structure of PE file and comparing a specified part from PE with a same part from common viruses file, this process offers a good way to detect malicious programs and viruses in the computer by saving viruses signatures in a specified file and scanning all PE files. The other part of the research rebuild the Import Address Table of any PE files that may make a call to one of three important and essential registry API functions in order to control the using of these functions in the system using one of the API hooking techniques to control Undesirable programs. The objective of the research is to control the executable files of the Windows system in order to provide protection for these files and the system as a whole. Research program was developed using Visual C + + 9.0.  

  PDF
A New Method for Iris Segmentation and Feature Extraction in Spatial Domain
Dujan Taha, Shamil Ibraheem (Author)
July 2012 ,Pages 35-46

Abstract: In this paper, a new proposed method is developed, this method contains two algorithms, one for human iris recognition, the other is for extracting the features of the recognized iris. Many studies tried to extract the iris from images, most of those studies succeeded but after using very complex processing and filtering operations in addition to transforming the image to other domains (such as frequency domain) to achieve the required operations. The proposed method deduct those complexities operations to a minimum and requires only wavelet transform in a small part of the second algorithm, all other operations will be applied directly to the spatial domain. Experimental results shows the efficiency of the method as its being applied to the images of the Chinese Academy of Sciences – Institute of Automation “CASIA” iris database which contains a lot of deformations. Finally, Matlab R2010a (Ver. 7.10.0) was used to implement the algorithms presented in this paper because it facilitates handling images, arrays, and filters.  

  PDF
Steganalysis Using KL Transform and Radial Basis Neural Network
Safwan Hasoon, Farhad Khalifa (Author)
July 2012 ,Pages 47-58

Abstract: The essential problem in the security field is how to detect information hiding. This paper proposes a new steganalysis scheme based on artificial neural network as a classifier to detect information hiding in colored and grayscale images. The statistical features extracted from Karhunen-Loève (KL) transform coefficients obtained from co-occurrence matrix of image. Then radial basis neural network (RBNN) trained using these features to discriminate  whether the image contains hidden information or not. This system can be used to prevent the suspicious secret communication.  

  PDF
Image Coding Using EZT Based on Contourlet Transformation
Khalil Alsaif, Teba Ghaze (Author)
July 2012 ,Pages 59-72

Abstract: Due to the fact that most of the application on EZT algorithm were applied on wavelet transformation. In the last ten years, the contourlet transformation shows that its efficiency is higher than the wavelet transformation due to its ability to deal with multidirections instead of the vertical and horizontal directions which are covered by the wavelet transformation. In this paper, the contourlet coefficient is adopted as inputs to the EZT (which normally are a wavelet coefficient ). Arranging the contourlet coefficient to be studied as input to EZT, the result of adopting modified contourlet coefficient was studied on two parameters (the file size and threshold value ) and tested by evaluating two factors (correlation and MSE). Comparing the result which we get it with the wavelet technique shows that the contourlet gives a result closer, to the original one depending on the correlation factor plus the PSNR factor. So, the proposed technique can be achieved.    

  PDF
Development a Special Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems
Basim Hassan (Author)
July 2012 ,Pages 73-84

Abstract: This paper develops a special conjugate gradient algorithm for solving  unconstrained minimized problems. This development can be regarded as some kind of convex combination of the MPR and MLS methods.  Experimental results indicate that the new algorithm is more efficient than the Polak and Ribiere - algorithm.  

  PDF
Brain Tumor Detection Using Snake Algorithm and Fuzzy C-Mean
Ramadan Ramo (Author)
July 2012 ,Pages 85-100

Abstract: In this research, two methods have been suggested for the detection of the brain tumor . (which is defined as the abnormal growth of cells), The first method is used the snake algorithm and the second Fuzzy C-mean . Initial  image hase been processed that converts the image to gray then a Median filtering method is used to remove noise and other false  features while maintaining the quality of public image. The methods are applied on a number of brain image with different angles. The results have to been presented of both methods and compared. The result show that snake method with a high speed in detecting the tumor, the matlab language has been used for the suggestions methods.  

  PDF
De-speckling 2D-Discrete Wavelet Transform with Hard Threshold Stage
Dhafer Hasan, Maha Abdul-Jabar, Zahraa Abed Al-Mokhtar (Author)
July 2012 ,Pages 101-112

Abstract: In this work, a new method is implemented for removing noise from gray scale image that depends on two-dimensional discrete wavelet transform and Threshold stage (hard threshold). This paper represents the algorithm to remove the speckle noise by using logarithm operation. This operation changes the multiplicative noise to additive noise. So that, the removing operation becomes easier. The Matlab program is used to build the Algorithm and measure the PSNR and other measurement criteria as (NMV, NV, NSD, ENL and PSNR) to study the effect of removing noise from corrupted image. The PSNR  reaches to 24dB which is very satisfactory result in the reconstructed image,  while the maximum value of ENL is 2.23 * 106,  and the minimum value of NMV, NV, NSD which is equal to 6.79, 2.67*10-5, 46* 10-4 respectively gives a smoother and cleaner image. The universal Threshold is applied in high frequency coefficient (i.e. the LH, HL, and HH-sub band of image) to remove the speckle noise and the low frequency coefficient (LL-sub band of image) is still without any change.  

  PDF
Development AES Algorithm to Encryption Images and Sounds Files
Mohammed Al-Zubaidy (Author)
July 2012 ,Pages 113-127

Abstract: In this research, the Advanced Encryption Standard (AES) algorithm was developed, the AES is used for encryption and decryption the images and sounds files by expanding the block size of data to reach the maximum size of 512 bit instead 128 bit/cycle, by using the Thread API techniques, which is a break off CPU working for increasing times taken the inline encrypt or decrypt operations. The data entranced from the file by size 512 bits per cycle, is converted to one dimension matrix by block size which is 2048 bit. The method considered 4-lines using 4 AES, which in every line, one AES is working in a distinct system. Transmission and reception of encoded files could be performed by using Email programs provided that the sent file does not include the encoding key for the purpose of protecting encoded files against unauthorized access. In addition to the use of the histogram in this research by comparing the block size of images or sounds files through the encrypting or decrypting system by scanning bit to bit operations. The implement algorithm with a sample of histogram was used to ensure that the data is not changed throughout this study.  

  PDF
A Study on the Conditions of Oscillation of Solutions of Second Order Impulsive Delay Differential Equations
Muayyad Khalil (Author)
July 2012 ,Pages 129-137

Abstract: Oscillation conditions of second order impulsive delay differential equations with impulses are investigated, some sufficient conditions for all solutions to be oscillatory are obtained. Also, two examples are given to illustrate the applicability of the results obtained.  

  PDF
The Detour Polynomials of Ladder Graphs
Ali Ali, Gashaw Muhammed-Saleh (Author)
July 2012 ,Pages 139-146

Abstract: The detour distance  between two distinct vertices  and  of a connected graph  is the length of a longest  path in. The detour index of  is defined by, and the detour polynomial of  is . The detour indices and detour polynomials of some ladder graphs are obtained in this paper.  

  PDF
On Simple GP – Injective Modules
Mohammed Youns, Najlaa Jassim (Author)
July 2012 ,Pages 147-154

Abstract: In this  paper, we study rings whose simple right R-module are GP-injective. We prove that ring whose simple right R-module is GP-injective it will be right -weakly regular ring. Also, proved that if R is N duo ring or R is NCI ring whose simple right R-module is GP-injective is S-weakly regular ring.  

  PDF
New Study of Stability for New Lorenz-like System
Ahmmed Jumaa, Alaa Hammodat (Author)
July 2012 ,Pages 155-161

Abstract: In this paper, we  studied differential system like of three dimensional Lorenz system. Nonlinear characteristic and basic dynamic properties of three dimensional autonomous system are studied by means of nonlinear dynamics theory, including the stability and we found that the value  is effected by the form of the roots.  

  PDF
Existence and Uniqueness of Solutions for Certain Nonlinear Mixed Type Integral and Integro-Differential Equations
Akram Mahmood, Lamyaa Sadoon (Author)
July 2012 ,Pages 163-173

Abstract: The aim of this paper is to study the existence, uniqueness and other properties of solutions of certain Volterra-Fredholm integral and integro differential equations. The tools employed in the analysis are based on the applications of the Banach fixed point theorem coupled with Bielecki type norm and certain integral inequalities with explicit estimates.  

  PDF
On Generalized Simple Singular AP-Injective Rings
Raida Mahmood, Husam Mohammad (Author)
July 2012 ,Pages 175-180

Abstract: A ring R is said to be generalized right simple singular AP-injective, if for any maximal essential right ideal M of R and for any bÎM, bR/bM is AP-injective. We shall study the characterization and properties of  this class of rings. Some interesting results on these rings are obtained. In particular, conditions under  which generalized simple singular AP-injective  rings are weakly regular rings, and Von Neumann regular rings.  

  PDF
A New Type of ξ-Open Sets Based on Operations
Haji Hasan (Author)
July 2012 ,Pages 181-189

Abstract: The aim of this paper is to introduce a new type of ξ-open sets in topological spaces which is called ξ-open sets and we study some of their basic properties and characteristics.  

  PDF
Pθ-Topological Groups in Nonstandard Analysis
Tahir Ismail, Ibrahim Hamad, Sami Hussein (Author)
July 2012 ,Pages 191-199

Abstract: The aim of this paper is to introduce and study a new class of topological groups called Pθ-topological group. By using some nonstandard techniques, we investigated some properties of Pθ-monads in Pθ-topological group.  

  PDF
Numerical solution and stability analysis of the Sine-Gordon system in two dimensions
Saad Manna, Haneen Jassim (Author)
July 2012 ,Pages 13-25

Abstract: This paper deals with the numerical solution for Sine-Gordon system in two dimensions using two finite difference methods the (ADE) and (ADI) methods .A comparison between the two methods has been done and we have obtained that the (ADE) method is the easer while the (ADI) method is more accurate than the (ADE) method. We also studied the stability analysis for each method by using Fourier (Von Neumann) method and we have obtained that the (ADI) method is unconditionally stable while the (ADE) method is stable under the condition  and    where  is the ratio of the waves speed  u , w and .     

  PDF
The Basis Number of Quadruple Join of Graphs
Ghassan Marougi, Raghad Mustafa (Author)
July 2012 ,Pages 27-34

Abstract: The basis number, b(G) ,of a graph G is defined to be the smallest positive integer k such that G has a k-fold basis for its cycle space. We investigate an upper bound for .It is proved that, if and  are connected vertex-disjoint graphs and each has a spanning tree of vertex degree not more than 4, then   The basis number of quadruple join of paths, are studied. It is proved that    

  PDF
Development Of Traditional Algorithms and Make a Hybrid Algorithm to Denoising The Color Images
Hanan Ali (Author)
July 2012 ,Pages 35-47

Abstract: The development in life has made the need very important for using images in many scientific fields like space, engineering and medicine. Due to the fact that such images are affected by various types of noises which produced from different sources which required some kind of filtering in order to produce a better images. The new algorithm applied in this research is obtained from merging two available methods using Matlab (2008). The first method adopts the mean filter while the second one uses the conservative smoothing filter .the application done on (jpg, gif) images for (salt & pepper) noises in different values and also (salt & pepper, Gaussian) noises which applied at the same time on the image. The result of each method is compared with the new result outcome from the application of the new hybrid algorithm.    

  PDF
Automatic Test Cases Generation Using an Advanced GEP Method
Najla Al-Saati, Roua Basil (Author)
July 2012 ,Pages 49-65

Abstract: This research aims to provide a practical work on the principle of the Extreme Programming (XP) which is a type of the Agile Software Development Methods which is used in the generation of test-cases using the design information.  The resources utilized in the design information presented here are the design diagrams generated using the Unified Modeling Language (UML), as they are considered to be the most commonly used modeling language in these days, and also the newest. These UML diagrams are used to automatically develop a set of high quality test cases which are then used to test the system’s code after being written. The main idea of this work is based on reducing the effort of the testing stage which costs more than 50% of the resources allocated for the whole development process; this cost may include the financial cost, the cost of the resources allocated for the project, and the timeline of the project. In this work, enhancements have been made to the concept of Gene Expression Programming to ensure the generation of high quality the test cases that are generated automatically, and a solution has been presented for the parallel paths and the loop paths problems that are found in the design.  

  PDF
Authentication of data hiding using co-occurrence matrix
Melad saeed, Ghada thanoon (Author)
July 2012 ,Pages 67-78

Abstract: This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message. The research designs and implements proposed system for verifying the authenticity of retrieved information which are ciphered and hidden inside colored images. This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration.             Results of applying this system on image files with different extensions, and on text messages with different sizes too, have shown supremacy in fighting spam.  

  PDF
w-Hosoya polynomials for Pentagonal Chains
Ali Ali, Shwan Abdul Ilyas (Author)
July 2012 ,Pages 79-91

Abstract: Properties of the width distance in graphs are given in this paper . The w-Hosoya Polynomials of straight pentagonal chains and of alternate pentagonal chains are obtained with Wiener indices of the width distance of such graphs.  

  PDF
A Proposed Methodology for Software Engineering of Agent Systems
Asmaa Hammo, Maher Alasaady (Author)
July 2012 ,Pages 93-115

Abstract: In recent years, computer systems that make use of software agents are increased, due to the increased size and complexity of these systems, as well as, because the benefits provided by agents to facilitating the developing process and requirements representation for these systems. Traditional software engineering methodologies are not enough to be used in the development of such systems, because the special characteristics for software agent, therefore there are many proposed Agent Based Software Engineering (ABSE) methodologies to support software engineers in the agents based systems development, However, some of  them were designed without adhering to all main stages of software development life cycle, as well as they are lacking for representation of most agents features, additionally, most of them are not represents the implementation phase or represented it but in unclear and unpractical manner. To address these issues, this research is investigated the existing methodologies and diagnose its strengths and weaknesses, then construct a proposed ABSE methodology depending on combining of strengths for existing methodologies, and delete or modify its weaknesses. This methodology is covered all main stages of software development life cycle, and dealing with problems in the existing methodologies. The requirements phase and part of the design phase were rely on Tropos methodology, whereas the implementation phase and part of the analysis and design phases were rely on MASD methodology, these stages has been modified by deleting its weaknesses and add some other novel techniques. To improve the new proposed methodology, a running agent based e-commerce system has been developed depending on stages of this methodology, and implement it with Java programming language and XML using the Jadex platform  

  PDF
Compression Image by Using Iterated Function Systems
Basil Al-khayat, Mahasin Younis (Author)
July 2012 ,Pages 117-133

Abstract: This research was in the compression digital images using the iterative function and applied to grayscale images, color images and then re-pressed image decoding. Matlab language is used for programming the system, the proposed algorithms have been applied to a number of images and the results show the efficient and accurate of the proposed algorithms. The method of compressing using iterative function systems methods are from loss compressing methods the advantage of these method by high compressing rate and this was confirmed by the results obtained have been getting a good percentage of the compressing and the quality is good and clear.  

  PDF
Using The Value of GPS To Determined The Position Of The Mobile User in Mosul University
Ghaydaa Al-Talib, Hiba Yahya (Author)
July 2012 ,Pages 135-146

Abstract: The Mobile is a circuit that  receives and sends signals through earth stations and satellites so the objective of this research is to build a system that retrieves information about  the location of the  mobile user . The proposed system gets information of the location of the mobile user within Mosul university depending on the values of longitude and Latitude that have  been received from GPS . The system displays on the mobile screen the values of longitude and latitude of the current location, as well as a list of names for the nearest buildings that surrounding the user location . The system works on a mobile model (Nokia) from the third generation and beyond. This mobile has an integrated GPS receiver. The job of this receiver is to receive the incoming signals from the satellites, and they are  working out of the buildings (out door). We used the Java 2 Micro Edition   (J2ME) Language to write the program for this application, since it is the language that is mostly used to write the mobile applications.  

  PDF
A Full List of Projectively Distinct K-Arcs in Finite Projetive Space Pg(2,8)
Ali A. Abdulla, Abdulkhalik Yasin (Author)
July 2012 ,Pages 147-158

Abstract: A k-arc in a plane PG(2,q)  is a set of k point such that every line in the plane intersect it in at most two points and there is a line intersect it in exactly two points. A k-arc is complete if there is no k+1-arc containing it. This thesis is concerned with studies a k-arcs, k=4,5,….,10 and classification of projectively distinct k-arcs and distinct arcs under collineation. We prove by using  computer program that the only complete k-arcs is for, k= 6,10. This work take (150) hours computer time .     

  PDF
Employing Information technology in Designing a Network Based Human Resources Information System
Raed Qadir Hamid, Inaam Jabbar Sultan (Author)
July 2012 ,Pages 159-174

Abstract: The research deals with the importance of ICT in the design of HRIS based on the network. Its importance lies in the practical side, through the adoption of the Technical Institute / Nineveh (application environment) on the HRIS based on the network as this system will reduce the effort and time required for data entry, and which also is maintained and confidentiality of information as well as access to information necessary for all individuals working in various units of the relationship, away from the movement between these units of information sources, participation is the objective basis of the objectives of the network. It has been used database management program MS Access in the development of the proposed system, as characterized by this program in its ability to work through the network with the same efficiency in which it operates on a personal computer, and that this program allows the possibility of sharing data, either by placing the entire database on the server, or put to share their data on the server. We has been taking the second option, where the database was divided and put tables on the server and then to copy all the objects on the workstations to reduce the pressure on the network, data is transmitted on the network and the rest of the organisms are present on all network computers.  

  PDF
Hybrid hiding in multimedia files
Farah Mohammed (Author)
July 2012 ,Pages 175-185

Abstract: The principle of hybrid information hiding represented by process of information hiding  message (multimedia files) embedded inside another message which is depended on hiding a certain media in another media using different domains (special domain, frequency domain) to provide protection and security for transformed data,  this paper  suggest an algorithm by using two different files first one compressed binary image, the compression method is run-length and hided this file inside the hostage media by use frequency domain which is represented by Discrete cosine transform (DCT), the second is text ciphered by Caesar method which is depended one secret key by using spatial domain. The data has been retrieved with no error for both text and binary image after deciphering and decompress process completed; the value of normalization correlation factor for both of them is equal to one.  

  PDF
Design Genetic Algorithm To Find The Optimal Critical Path Network Project (GAOCPN)
Samaa Azeez, Niam Al-Thanoon, Lamyaa Mohammed (Author)
July 2012 ,Pages 187-210

Abstract: The present study deals with using up-to-date intelligent techniques. We try to utilize the genetic algorithm efficiently and integrate it with the problem of study by designing and applying a genetic algorithm to find the optimal critical path of networks GAOCPN achieving many results, e.g., real time. Accuracy in representing the steps of project execution as a net of nodes and paths has a great role in the accuracy of program results GAOCPN written in C++ version 5.0 under Window. The program was applied on many networks, such as Al-Sarafiya Bridge networks, and the execution time and results were checked and compared with the execution time and results of traditional methods (dynamic programming) and Win_QSB program. The GAOCPN showed accuracy of results in a standard time. Sometimes, it showed optimal results better than those of the traditional methods and it showed results identical to Win_QSB but in standard time.  

  PDF