Vol. 4 No. 1 (2007)
Articles
Abstract: In this paper, we have developed a new self-scaling VM-method for solving unconstrained nonlinear optimization problems. The numerical and theoretical results demonstrate the general effectiveness of the new self-scaling VM-method when compared with PHUA & ZENG algorithm ; we have tested these algorithms on several high-dimension test functions with promising numerical results.
Abstract: Stability study of stationary solutions of the viscous Burgers equation using Fourier mode stability analysis for the stationary solutions , where is constant and , in two cases is analyzed. Firstly when the wave amplitude is constant and secondly when the wave amplitude is variable. In the case of constant amplitude, the results found to be: The solution is always stable while the solution is conditionally stable. In the case of variable amplitude, it has been found that the solutions and are conditionally stable.
Abstract: Chae et. al. (1995) have studied the concept of a-strongly q-continuous functions and (a, q)-closed graph. The aim of this paper is to investigate several new characterizations and properties of a-strongly q-continuous functions and (a, q)-closed graph. Also, we define a new type of functions called aq-open functions, which is stronger than quasi a-open and hence strongly a-open, and we obtain some characterizations and properties for it. It is shown that the graph of f, G ( f ) is (a, q)-closed graph if and only if for each filter base Y in X q-converging to some p in X such that f (Y) a-converges to some q in Y holds, f ( p) = q.
Abstract: The Wiener index is a graphical invariant which has found many applications in chemistry. The Wiener Polynomial of a connected graph G is the generating function of the sequence (C(G,k)) whose derivative at x=1 is the Wiener index W(G) of G, in which C(G,k) is the number of pairs of vertices distance k apart. The Wiener Polynomials of star-like trees and other special trees are found in this paper; and hence a formula of the Wiener index for each such trees is obtained .
Abstract: This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities. The main purpose of it is to perform a job by the server that can't be used by some with a disability essentially denies that otherwise qualified person job. An application was designed through connection point by the COM+ programming. The application performs a security for both the client and server computers and have the ability of disable option to prevent the user from making trouble in the computer.
Abstract: The aim of this study, is the diagnosis of Congenital Dislocation of the Hip (CDH) from routine X-Ray Image by measuring the retardation of the growth center of the head of femur bone in the abnormal joint in comparison with the normal side in cases of unilateral CDH using Mask Technique and algorithm of Center Detection and measurement. What is new about this study in comparison with the previous methods about diagnosis of CDH (which used artificial technique images matching subject to detect the diseased image only by compare the diseased images with normal image without giving any percent of disease) can be summarized by: 1.Going into the details of the X-Ray and cutting out the necessary parts ( head of femur ) for both the diseased and normal sides in cases of unilateral CDH, to make comparison between them instead of using the complete image. 2.Using Mask Technique and algorithm of Center Detection to extract the features (Center, Intensity value of the center, and Diameter ) from the two captured images. Then we do a comparison for both sides for these features using Euclidean Distance to know the diseased side from the normal one. We applied this system in computer using Matlab 7.0 programming Langue.
Abstract: A new method for solving Large-Scale problems in the unconstrained optimization has been proposed in this research depending on the BFGS method. The limited memory is used in the BFGS method by multiplying the BFGS matrix by a vector to obtain vectors instead of matrices and only two vectors can be stored, by modifying the algorithm given by Nocedal J (1999). The purpose of this algorithm is to enable us to solving the Large-Scale Problems, as it is obvious to everyone that the computer can store millions of vectors, whereas its ability in storing matrices is limited. The present method in this research is applied on seven nonlinear functions in order to evaluate the method efficiency in the numbers of iterations (NOI), number of functions (NOF) and function value and comparing it with the standard BFGS method after updating. This method has been applied on functions with variables till 1000000 and more than that. From comparing the results, we fined that this algorithm was the best.
Abstract: The Sine – Gordon equation has been solved numerically by using two finite differences methods: The first is the explicit scheme and the second is the Crank – Nicholson scheme. A comparison between the two schemes has been made and the results were found to be : the first scheme is simpler and has faster convergence while the second scheme is more accurate . Also , the stability analysis of the two methods by the use of Fourier (Von Neumann) method has been done and the results were found to be : The explicit scheme is conditionally stable if and the Crank–Nicholson is unconditionally stable .
Abstract: In this research a new algorithm was suggested for compressing speech files added a new style for storing signals, The suggested idea of compression begins with recording the speech via the microphone, then starting the proposed processing steps as follows : Removing silent period. Select the number of resulted signal samples. Segmenting the resulting signal to number of frames. Applying one of the curves fitting algorithms and obtaining the coefficients for the mathematical representation. Storing the results in a new file format with .ssc (Speech Signal Compression) extension. While the decompression process consisted of the reversal compression process steps, the signal is reconstructed using curve fitting coefficients which were stored in the new file, followed by returning the selected sample, then returning the silent period to their original location and finally listening to the retrieved speech signal. When the proposed algorithm had been applied on the files with different speech contents, the compression ratio was approximately (16.283%), and the ratio of SEGSNR was approximately (25.195dB).
Abstract: In this work we use Genetic Algorithm for best section to implement many independent tasks on multiprocessor systems. The chromosome represented by numbers of integer value, every value represents one of the processors in the system, we use the simple crossover to generate the next population, and we us the mutation of type partial gen for mutation which has a good role to improve results of scheduling, the program written by matlab (6.5).The results, after a small number of iterations, were very good .
Abstract: The aim of this paper is to design a software for examination committee work management using Visual FoxPro programming language, which is considered as one of the most popular and useful visual programming languages that supports Database Management System (DBMS). This software is designed to facilitate the management of examination committee work to assist the documentation for the important data like card files and records and to retrieve examination information. The software has the ability to display the students’ marks after data insertion. These data are gained from Microsoft Excel tables. In addition, the software could compute the annual total marks, the final marks, the average, and the estimation. Besides it could search the database for a specified student name. The students’ marks, the final results, and the sequence and estimation for passed students could be organized as a printing material. Also the software gives printed reports for first semester, midyear, second semester, and annual total marks, for all studied subjects of a specified stage and according to that stage classes. In addition to the capability of statistical computing for the pass ratio, total number of students and the number of passed students according to the stage, with printed capabilities.
Abstract: The Burger equation had been solved numerically by using two finite differences methods. The first is explicit scheme method and the second is Crank–Nicholson method. A comparison had been made between the two and we find that the Crank–Nicholson method is the best and most accurate than the explicit scheme method, as it is shown in (Table 1). Also the numerical stability for both methods has been made, the explicit scheme method is conditionally stable and the condition is , while Crank–Nicholson method is unconditionally stable.
Abstract: This research develops a new program to teach (reading, mathematics, and sciences for the first primary class in Iraq and with simple and interactive techniques where the computer is considered as one of the most popular electronics innovations that convey humanity into vast fields. Accordingly, numerous life fields have been affected with the revolutionary effectiveness related to it, and hence, it becomes a significant device, which cannot be neglected at all. Having a quick look at the computer and its educational utilizations, one could recognize that theComputer Assisted learning system is nowadays the most common educational contribution in the learning process.
Abstract: In this paper we have investigated viscous flow in symmetric thin liquid films which are inclined by an inclination angle to the horizontal for an incompressible liquids in two dimensions with no inertia force. We use the (Navier-Stocks) equations and we obtain equations that govern such flow and we solved these equations by numerical methods to obtain the thickness of the film.
Abstract: This research deals with design and implementation of a new steganographic algorithm to hide secret messages inside digital images. To achieve security to the transmitted messages, a secret key is used to prevent unauthorized persons from extracting these messages. Embedding has been achieved using grey and color images as a cover. Matlab is used to implement the algorithm due to the facilities it provides for dealing with digital images and matrices as well as GUI. Finally, experimental results demonstrate the effieciency of the algorithm in hiding information in imperceptible manner.
Abstract: Recently, the applications of the remote sensing increased in hydrology studies and waters management especially that concerned with rivers basins. This research includes using digital image processing applications on Mosul images for studying hydrological behavior of Tigirs river at mosul city. By the application of a set of operations that belong to digital image process, which include preprocessing and enhancement images. The result of these applications showed a perfect image covering all river in the study area, with high contrast ratio equal (2.455) and with a small error equals (0.099). as well as getting four segments for Tigers river which represent the changes in the state and capacity of the river.
Abstract: Morse code is considered as one of the codes that are used to transfer information among long distant areas. The research concentrates on Morse code applications, transmissions to overcome weakpoints, a necessary mixture between coding and cryptography to get benefits from the properties of each one of them to increase the secrecy of morse code transmission. Anew algorithm was put in use for encryption and decryption which passes through multistage process, each stage has special properties that make the transmission more confident and safer than the stage before. In addition to the ability of using password as a key, which is at the same time passed through the same encryption processes which make it hard to break. This work is applied on integrated programming environoment which is (MATHCAD).