مجلد 6 عدد 2 (2009)
Articles
Abstract: In this paper an iterative method for the fixed point is used to obtain an approximation solution for the Fredholm integral equations of the second kind by using several problems with different accuracy .Also we have proposed a successful improvement for the iterative fixed point method. A number of different tests are solved and compared in order to study the effectiveness of the proposed technique.
Abstract: This paper involves the combination between the conjugate pair and hybrid conjugate gradient methods. The new combined algorithm is based on exact line search and it is examined by using different nonlinear test functions in various dimensions. Experimental results indicate that the updated algorithm is more effective than of the two original algorithms.
Abstract: In this paper, we study rings whose principal right ideals are left pure. Also we shall introduce the concept of a fuzzy bi-ideal in a ring, and give some properties of such fuzzy ideals. We also give a characterization of whose principal right ideal are left pure, fuzzy duo ring in terms of fuzzy deals.
Abstract: We solvein this paper some machine scheduling problems with certain conditions; the solution had been made by using dynamic programming procedures with a fixed time for all the algorithms. Some of the algorithms described in the paper represent a modification to some mathematical programming algorithms and some of them are new or a generalization to others. The optimal solution of all these algorithms will be done with a fixed complexity time, which may lead us to solve them easier and faster.
Abstract: The Burger’s-Huxley equation has been solved numerically by using two finite difference methods, the explicit scheme and the Crank-Nicholson scheme. A comparison between the two schemes has been made and it has been found that, the first scheme is simpler while the second scheme is more accurate and has faster convergent. Also, the stability analysis of the two methods by using Fourier (Von Neumann) method has been done and the results were that, the explicit scheme is stable under the condition and the Crank-Nicholson is unconditionally stable.
Abstract: In this paper, a method for detecting the direction of a human face is developed; regardless of its age or sex. The method involves creating a set of five face patterns representing the front, up, down, left, and right directions of a face. The face patterns are produced by applying Canny’s edge detection algorithm on some face files. The direction of the input face is found by first applying the above algorithm on the input file and comparing it with the five face patterns. The face pattern that gives minimum difference will represent the direction of the input face. Excellent results were reported when applied on images with relatively clear background and the head were centered at the image area.
Abstract: In order to provide accurate recognition of individuals, the most discriminating information present in an iris pattern must be extracted. Only the significant features of the iris must be encoded so that comparisons between templates can be made. Most iris recognition systems make use of a band pass decomposition of the iris image to create a biometric template. In this paper, the feature extraction techniques are improved and implemented. These techniques are using wavelet filters. The encoded data by wavelet filters are converted to binary code to represent the biometric template. The Hamming distance is used to classify the iris templates, and the False Accept Rate (FAR), False Reject Rate (FRR) and recognition rate (RR) are calculated [1]. The wavelet transform using DAUB12 filter proves that it is a good feature extraction technique. It gives equal FAR and FRR and a high recognition rate for the two used databases. When applying the DAUB12 filter to CASIA database, the FAR and FRR are equal to 1.053%, while the recognition rate is 97.89%. For Bath database the recognition rate when applying DAUB12 filter is 100%. CASIA and Bath databases are obtained through personal communication. These databases are used in this paper.
Abstract: The n-Wiener polynomials of the Cartesian products of a complete graph Kt with another complete graph Kr, a star graph Sr, a complete bipartite graph Kr,s, a wheel Wr, and a path graph Pr are obtained in this paper. The n-diameters and the n-Wiener indices of Kt×Kr, Kt×Sr, Kt×Kr,s, Kt×Wr and Kt×Pr are also obtained.
Abstract: The main challenge in Arabic handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects in a short period of time high recognition rate. Due to its low computational requirement, genetic algorithm is probably the most efficient method available for character recognition. In this research we use objective of genetic algorithm where the minimization of the number of features and a validity index that measures the quality of clusters have been used to guide the search towards the more discriminate features and the best number of clusters, and use Hopfield Neural Network as recognizer. In this research Arabic handwritten characters recognition is applied. Experiments show the efficiency and flexibility of the proposed system, and show that Genetic Algorithm (GA) and Hopfield neural network are applied here to improve the recognition accuracy and make the recognition operation faster.
Abstract: This research studied ant colony optimization with optimization problem as an assignment model problem by Hungarian method. The proposed heuristic algorithm simulate ant colony optimization algorithm with Hungarian method for Assignment problem. The ant colony optimization algorithm simulates the behavior of real ant colony, to find the shortest path between many paths for solving the problem. It dependent on the path from the nest (problem of research) to food (optimal solution) by deposited pheromone on the path they take between the nest and food, so that other ants can smell it.The experiment in this research shows that the algorithm provides optimal solution. It has outperforms with computation and it is an effective approach and the algorithm performs significantly better than the classical method, to reduce the region of the space considered and computation as compared to the classical methods.
Abstract: This paper presents the recently-discovered linear [n,3,d] codes over PG(2,29) that arises from a complete (n,r)-arcs which the paper[12] presented it for the first time. The aim of this paper is to formulate the recently discovered upper bounds and lower bound for (n,r)-arcs as bounds that will look familiar to coding theorists.New two lists in this paper appeared, the first list of 15 codes arranged from[164,3,156]-code up to [704,3,678]-code, the second list of 27 codes arranged from [28,3,25]-code up to [776,3,747]-code, they are appeared for the first time in this paper, all of these codes we can call them as complete codes as thier definition in this paper, they belong to the class of error-correcting codes (ECC).In this paper I made a computer programs to construct these new codes with Random Greedy Construction method (RGC) which is mentioned in [13].
Abstract: In this work, the use of an artificial immune system (AIS ) in cryptanalysis is explored. This AIS uses the clonal selection principle for the cryptanalysis of knapsack cipher. Results showed that the proposed approach is good especially when the effect of the control parameters on the performance of the clonal selection is well taken into consideration. The program is written in Turbo C.
Abstract: In this paper, we introduce a new ring which is a generalization of Von Neumann regular rings and we call it a centrally regular ring. Several properties of this ring are proved and we have extended many properties of regular rings to centrally regular rings. Also we have determined some conditions under which regular and centrally regular rings are equivalent.
Abstract: Face recognition is considered one of the visual tasks which humans can do almost effortlessly while for computers it is a difficult and challenging task. This research deals with the problem of face recognition. A novel approach is presented for both face feature extraction and recognition, first, we introduce Principal Component Analysis (PCA) for face feature extraction, Generalized Regression Artificial Neural network for face recognition. The performance of the whole system was done after training with 120 color images (40 human faces with 3 poses) and testing using 40 color images. The images were taken from Collection of Facial Images: Faces95 by Computer Vision Science Research Projects. Experimental results for proposed human face recognition confirm that the proposed method lends itself to good extraction and classification accuracy relative to existing techniques.
Abstract: This research presents three robust blind watermarking algorithms in the discrete wavelet transform and spatial domain based on neural network and fuzzy logic artificial intelligent techniques. To enhance the performance of the watermarking system the first algorithm is developed by combining Radial Basis Function (RBF) neural network with Discrete Wavelet Transform (DWT) using (DWT-RBFW) algorithm for embedding and extracting of watermark. The second developed (RBFW) algorithm used RBF neural network for embedding and extracting of watermark based on intensity of whole image. The third developed (FL-EXPW) watermarking method is based on fuzzy logic and expert system techniques and it’s the best algorithm among the three methods. The developed watermarking algorithms are robust against various attacks signal processing operations such as additive noise and jpeg compression, and geometric transformations.
Abstract: In this paper, we have used one of the preconditioned conjugate gradient algorithm with the Quasi – Newton approximation; namely the BFGS preconditioned algorithm which was suggested by (AL-Bayati and Aref, 2001). In this paper we have suggested a new algorithm for constrained optimization with robust numerical results, for solving constrained optimization problems.
Abstract: The Stability Analysis of Convection& Diffusion equation by using Fourier mode Stability analysis in two cases has been considered , the first one when the amplitude is constant and the second one when the amplitude is variable . In the first case, the solution is always stable and in the second case the solution is conditionally stable .
Abstract: Recently, techniques and applications in space data processing it's and study characteristics in different areas and applications such as remote sensing study of land use, land cover and geological applications are increased. The research contained study and application of technical wavelet transformation to highlight information packages statement space for Mosul Dam and extracting ground obvious manifestations of this region by applying the classification on the wave beam generated. The results showed that the classification of images resulting from the wavelet transformation was accurate and of high amount (%96.715) compared to the results of the classification of non-original images using the improved wavelet transformation, with the accuracy of the classification (%92.652) and to obtain a clear picture parameters for the study of high quality. especially when discrimination features such as terrestrial lake, the body of dams and residential areas in addition to discrimination agricultural areas, the classification algorithm, which was used in this study, is an algorithm of Mahalanobis Distance.
Abstract: Image denoising and enhancement is an important field and it is used very much in image processing, where images are corrupted by many kinds of noise, therefore, methods and techniques must be used to remove these noises. In this research seven traditional filters are used to remove noise from digital images corrupted with salt&pepper noise and Gaussian noise. And also adopting principle of fuzzy logic to hybrid between traditional filters and fuzzy logic using double bell shaped membership function and also hybrid with double adjusted sigmoid membership function to create seven fuzzy sigmoidal filters. After applying seven traditional methods, seven fuzzy bell methods and seven fuzzy sigmoidal methods , by using measures of restored image PSNR, MSE, MAE , shows the final methods i.e. seven fuzzy sigmoidal methods are better than other filters i.e. methods that are used in this research after comparing the results.
Abstract: This paper is devoted to analyze the stability of shallow water of a system of equations that was exposed to disturbancing. This analysis is done by finding the eigenvalues of the system which enables us to investigate the grow of disturbance after setting shallow water equations in linearization form. It is obtain from the results analysis that the equations are stable when the real part of wave velocity is negative ,and unstable when it is positive.