Articles

On Self-Scaling Variable-Metric Algorithms
Abbas Al-Bayati, Mardin Taher (Author)
July 2007 ,Pages 11-18

Abstract: In this paper, we have developed a new self-scaling VM-method for solving unconstrained nonlinear optimization problems. The numerical and theoretical results demonstrate the general effectiveness of the new self-scaling VM-method when compared with  PHUA  &  ZENG  algorithm ; we have tested these algorithms on several high-dimension test functions with promising numerical results.  

  PDF
Stability Study of Stationary Solutions of the Viscous Burgers Equation
Mohammad Sabawi (Author)
July 2007 ,Pages 19-40

Abstract: Stability study of stationary solutions of the viscous Burgers equation using Fourier mode stability analysis for the stationary solutions , where  is constant and , in two cases is analyzed. Firstly when the wave amplitude  is constant and secondly when the wave amplitude  is variable. In the case of constant amplitude, the results found to be: The solution  is always stable while the solution  is conditionally stable. In the case of variable amplitude, it has been found that the solutions  and  are conditionally stable.  

  PDF
On α-strongly θ-continuity, αθ-openness and (α, θ)-closed graphs in Topological Spaces
Abdullah Abdul-Jabbar (Author)
July 2007 ,Pages 41-56

Abstract: Chae  et. al. (1995) have studied the concept of  a-strongly q-continuous functions and (a, q)-closed graph. The aim of this paper is to investigate several new characterizations and properties of  a-strongly q-continuous functions and   (a, q)-closed graph. Also, we define a new type of functions called  aq-open functions, which is stronger than quasi a-open and hence strongly  a-open, and  we obtain some characterizations and properties for  it. It is shown that the graph of f, G ( f ) is (a, q)-closed graph if and only if for each filter base Y in X   q-converging to some p in X such that f (Y)  a-converges to some q in Y holds,  f ( p) = q.  

  PDF
On Rings whose Maximal Essential Ideals are Pure
Raida Mahmood, Awreng Mahmood (Author)
July 2007 ,Pages 57-62

Abstract: This paper introduces the notion of a right MEP-ring (a ring in which every maximal essential right ideal is left pure) with some of their basic properties; we also give necessary and sufficient conditions for MEP – rings to be strongly regular rings and weakly regular rings.            

  PDF
On Rings Whose Principal Ideals are Generalized Pure Ideals
Husam Mohammad (Author)
July 2007 ,Pages 63-68

Abstract: This paper , introduces the notion of a right PIGP-ring (a ring in which every principal ideal of R is a GP-ideal ) with some of their basic properties ; we also give necessary and sufficient conditions for PIGP-rings to be a division ring and a regular ring .  

  PDF
On the Wiener Polynomials of Some Trees
Ali Ali, Ahmed Ali (Author)
July 2007 ,Pages 69-83

Abstract: The Wiener index is a graphical invariant which has found many applications in chemistry. The Wiener Polynomial of a connected graph G is the generating function of the sequence (C(G,k)) whose derivative at x=1 is the Wiener index W(G) of G, in which C(G,k) is the number of pairs of vertices distance k apart. The Wiener Polynomials of star-like trees and other special trees are found in this paper; and hence a formula of the Wiener index for each such trees is obtained .   

  PDF
Connectable Internet Address Object Point using the Active Accessibility
Mohammed Hasan, Manar Ahmed (Author)
July 2007 ,Pages 85-94

Abstract: This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities. The main purpose of it is to perform a job by the server that can't be used by some with a disability essentially denies that otherwise qualified person job. An application was designed through connection point by the COM+ programming. The application performs a security for both the client and server computers and have the ability of disable option to prevent the user from making trouble in the computer.  

  PDF
The Prime Spectra of Regular Rings
Nazar Shuker, Abdul Mohammad, Huda Khalil (Author)
July 2007 ,Pages 95-106

Abstract: In this work, we study the prime spectrum of regular rings. Also we study some topological concepts as quasi-compact, compact, totally disconnected, and irreducible topological space in order to prove some new results on the prime spectrum of regular ring.  

  PDF
Using Mask Technique and Center Detection for Congenital Dislocation of the Hip (CDH) Diagnosis
Nidal AL-Assady, Mafaz Khalil Alanezi, Shahla Ahmad (Author)
July 2007 ,Pages 107-122

Abstract: The aim of this study, is the diagnosis of Congenital Dislocation of the Hip (CDH) from routine X-Ray Image by measuring the retardation of the growth center of the head of femur bone in the abnormal joint in comparison with the normal side in cases of unilateral CDH using  Mask Technique and algorithm of Center Detection and measurement. What is new about this study in comparison with the previous methods about diagnosis of CDH (which used artificial technique images matching subject to detect the diseased image only by compare the diseased images with normal image without giving any percent of disease) can be summarized by: 1.Going into the details of the X-Ray and cutting out the necessary parts ( head of femur ) for both the diseased and normal sides in cases of unilateral CDH, to make comparison between them instead of using the complete image. 2.Using Mask Technique and algorithm of Center Detection to extract the features (Center, Intensity value of the center, and Diameter ) from the two captured images. Then we do a comparison for both sides for these features using Euclidean Distance to know the diseased side from the normal one. We applied this system in computer using Matlab 7.0 programming Langue.  

  PDF
Enriched Algorithms for Large Scale Unconstrained Optimization
Abbas Al-Bayati, Omar Mohammad (Author)
July 2007 ,Pages 11-37

Abstract: A new method for solving Large-Scale problems in the unconstrained optimization has been proposed in this research depending on the BFGS method. The limited memory is used in the BFGS method by multiplying the BFGS matrix by a vector to obtain vectors instead of matrices and only two vectors can be stored, by modifying the algorithm given by Nocedal J (1999). The purpose of this algorithm is to enable us to solving the Large-Scale Problems, as it is obvious to everyone that the computer can store millions of vectors, whereas its ability in storing matrices is limited. The present method in this research is applied on seven nonlinear functions in order to evaluate the method efficiency in the numbers of iterations (NOI), number of functions (NOF) and function value and comparing it with the standard BFGS method after updating. This method has been applied on functions with variables till 1000000 and more than that. From comparing the results, we fined that this algorithm was the best.  

  PDF
Numerical Solution and Stability Analysis of the Sine-Gordon Equation
Saad Manna, Norjan Juma (Author)
July 2007 ,Pages 39-56

Abstract: The Sine – Gordon equation has been solved numerically by using two finite differences methods: The first is the explicit scheme and the second is the Crank – Nicholson scheme. A comparison between the two schemes has been made and the results were found to be : the first scheme is simpler and has faster convergence while the second scheme is more accurate . Also , the stability analysis of the two methods by the use of Fourier (Von Neumann) method has been done and the results were found to be : The explicit scheme is conditionally stable if  and the Crank–Nicholson is unconditionally stable .  

  PDF
Speech Files Compression Based on Signal Feature
Khalil Alsaif, Saja Mohammed (Author)
July 2007 ,Pages 57-79

Abstract: In this research a new algorithm was suggested for compressing speech files added a new style for storing signals, The suggested idea of compression begins with recording the speech via the microphone, then starting the proposed processing steps as follows : Removing silent period. Select the number of resulted signal samples. Segmenting the resulting signal to number of frames. Applying one of the curves fitting algorithms and obtaining the coefficients for the mathematical representation. Storing the results in a new file format with .ssc (Speech Signal Compression) extension. While the decompression process consisted of the reversal compression process steps, the signal is reconstructed using curve fitting coefficients which were stored in the new file, followed by returning the selected sample, then returning the silent period to their original location and finally listening to the retrieved speech signal. When the proposed algorithm had been applied on the files with different speech contents, the compression ratio was approximately (16.283%), and the ratio of SEGSNR was approximately (25.195dB).  

  PDF
Using genetic Algorithm in Task scheduling for Multiprocessing System
Asmaa Hammo, Ghosun Basheer, Muna Jawhar (Author)
July 2007 ,Pages 81-98

Abstract: In this work we use Genetic Algorithm for best section to implement many independent tasks on multiprocessor systems. The chromosome represented by numbers of integer value, every value represents one of the processors in the system, we use the simple crossover to generate the next population, and we us the mutation of type  partial gen for mutation  which has a good role to improve results of scheduling, the program written by matlab (6.5).The results, after a small number of iterations, were very good .  

  PDF
Examination Committee Work Management System
Abdul Suleiman, Turfa Hamed, Nadia Saleh (Author)
July 2007 ,Pages 99-118

Abstract: The aim of this paper is to design a software for examination committee work management using Visual FoxPro programming language, which is considered as one of the most popular and useful visual programming languages that supports Database Management System (DBMS).             This software is designed to facilitate the management of examination committee work to assist the documentation for the important data like card files and records and to retrieve examination information.             The software has the ability to display the students’ marks after data insertion. These data are gained from Microsoft Excel tables. In addition, the software could compute the annual total marks, the final marks, the average, and the estimation. Besides it could search the database for a specified student name. The students’ marks, the final results, and the sequence and estimation for passed students could be organized as a printing material. Also the software gives printed reports for first semester, midyear, second semester, and annual total marks, for all studied subjects of a specified stage and according to that stage classes. In addition to the capability of statistical computing for the pass ratio, total number of students and the number of passed students according to the stage, with printed capabilities.  

  PDF
Numerical Analysis of the Burger Equation using Finite Differences
Saad Manna, Badran Salem (Author)
July 2007 ,Pages 119-132

Abstract: The Burger equation had been solved numerically by using two finite differences methods. The first is explicit scheme method and the second is Crank–Nicholson method. A comparison had been made between the two and we find that the Crank–Nicholson method is the best and most accurate than the explicit scheme method, as it is shown in (Table 1). Also the numerical stability for both methods has been made, the explicit scheme method is conditionally stable and the condition is , while Crank–Nicholson method is unconditionally stable.  

  PDF
Using Computer in Primary Education
Shaima Al-Mashhadani (Author)
July 2007 ,Pages 133-147

Abstract: This research develops a new program to teach (reading, mathematics, and sciences for the first primary class in Iraq and with simple and interactive techniques where the computer is considered as one of the most popular electronics innovations that convey humanity into vast fields. Accordingly, numerous life fields have been affected with the revolutionary effectiveness related to it, and hence, it becomes a significant device, which cannot be neglected at all.      Having a quick look at the computer and its educational utilizations, one could recognize that theComputer Assisted learning system is nowadays the most common educational contribution in the learning process.  

  PDF
Flow in Inclined Thin Liquid Films with no Inertia Force
Joseph Abdel-Ahd, Hikmat Mustafa, Khidr Khidr (Author)
July 2007 ,Pages 149-159

Abstract: In this paper we have investigated viscous flow in symmetric thin liquid films which are inclined by an inclination angle  to the horizontal for an incompressible liquids in two dimensions with no inertia force. We use the (Navier-Stocks) equations and we obtain equations that govern such flow and we solved these equations by numerical methods to obtain the thickness of the film.  

  PDF
Steganographic Algorithm in Spatial Domain
Dujan Taha, Ghada Tahir Qasim (Author)
July 2007 ,Pages 160-176

Abstract: This research deals with design and implementation of a new steganographic algorithm to hide secret messages inside digital images. To achieve security to the transmitted messages, a secret key is used to prevent unauthorized persons from extracting these messages. Embedding has been achieved using grey and color images as a cover. Matlab is used to implement the algorithm due to the facilities it provides for dealing with digital images and matrices as well as GUI. Finally, experimental results demonstrate the effieciency of the algorithm in hiding information in imperceptible manner.  

  PDF
Using Digital Image Processing for Studying Hydrological Behavior of Tigirs River at Mosul City
Muhammad Omar, Khattab Mustafa (Author)
July 2007 ,Pages 177-192

Abstract: Recently, the applications of the remote sensing increased in hydrology studies and waters management especially that concerned with rivers basins. This research includes using digital image processing applications on Mosul images for studying hydrological behavior of Tigirs river at mosul city. By the application of a set of operations that belong to digital    image process, which include preprocessing and enhancement images. The result of these applications showed a perfect image covering all river  in the study area, with high contrast ratio equal (2.455) and with a small error equals (0.099). as well as getting four segments for Tigers river which represent the changes in the state and capacity of the river.   

  PDF
Development Hyper Algorithm for Encryption Arabic Text using Mors Code
Najla Dabagh, Melad saeed, Subhi Hamadi (Author)
July 2007 ,Pages 193-209

Abstract: Morse code is considered as one of the codes that are used to transfer information among long distant areas.             The research concentrates on Morse code applications, transmissions to overcome  weakpoints, a necessary mixture between coding and cryptography to get benefits from the properties of each one of them to increase the secrecy of morse code  transmission.             Anew algorithm was put in use for encryption and decryption which passes through multistage process, each stage has special properties that make the transmission more confident and safer than the stage before.             In addition to the ability of using password as a key, which is at the same time passed through the same encryption processes which make it hard to break.             This work is applied on integrated programming environoment which is (MATHCAD).    

  PDF