مجلد 6 عدد 3 (2009)
Articles
Abstract: In this paper a new low-storage VM-algorithm for constrained optimization is investigated both theoretically and experimentally. The new algorithm is based on both the well-known Fletcher's low storage algorithm which generates columns Z spanned on the gradient vectors g1, g2, ... gn and the idea of both Buckley and LeNir of combined variable storage-conjugate gradient method. The well-known SUMT algorithm is adapted to implement the new idea. The new algorithm is very robust compared with the standard low-storage Fletcher algorithm and the standard SUMT algorithm which was designed for solving constrained problems, of the numerical results of application very promising.
Abstract: Conjugate gradient methods are wildly used for unconstrained optimization especially when the dimension is large. In this paper we propose a new kind of nonlinear conjugate gradient methods which on the study of Dai and Liao (2001), the new idea is how to use the pair conjugate gradient method with this study (new cojugacy condition) which consider an inexact line search scheme but reduce to the old one if the line search is exact. Convergence analysis for this new method is provided. Our numerical results show that this new methods is very efficient for the given ten test function compared with other methods.
Abstract: The aim of this study is to determine the number of base slatlons and capacity of each base station to satisfy the increased traffic demand and serving all traffic demand areas with a sufficient number of base stations, which is using a minimum number of base stations in order to minimize the total cost. The problem is formulated as a binary linear program ming problem, and is solved by a specific algorithm. For this reason, we have built a specific algorithm to solve the model, with programming this algorithm by using Microsoft Access using Visual Basic applications, which has ability to have a decision about any changes and fluctuations. Advantages of the algorithm can obtain best (optimum) solution with least steps. Computational results show that the proposed model is highly effective and it is applicable, as well. For (30) candidate base stations and (15) TDAs, we have applied the model with low costs differ by (10 unit $) with satisfying the required demand for all TDAs.
Abstract: In this paper we study idempotent elements, we give some new properties of idempotent elements and provide some exam we also study central idempotent elements and orthogonal idempotent elements and give some new properties of such idempotent. Finally we study special ring which satisfies the property for all x in R and n is a positive integer, we represent such ring in termes of idempotent and nilpotent elements.
Abstract: In this paper, we suggested an approach to solve Multi-Objective Complementary Programming Problem (MOCPP) by using optimal average (OAV). The computer application of algorithm also has been demonstrated by flow-chart and solving a numerical examples by using MATHLABR2006a, and shown results in tables.
Abstract: The aim of this paper is solving system of non-linear Volterra integral equations of the second kind (NSVIEK2) numerically using Predictor-Corrector methods (P-CM). Two multistep methods (Adams-Bashforth, Adams-Moulton). Convergence and stability of the methods are proved and some examples are presented to illustrate the methods. Programs are written in matlab program version 7.0.
Abstract: This paper investigates a novel algorithm for compressing and encrypting Arabic short text messages (SMS messages). Short text messages are used in cellular networks. Compression is required for saving the transmission energy or to use bandwidth in an efficient manner in addition to save the user money while the end-to-end effective encryption is required for security providence. This work succeeded to overcome small size limitation of the SMS message by changing Arabic characters coding from Unicode to Base64 coding scheme and developing a runt version of lossless Huffman coding scheme. Examples are shown where the application of the text compressor for short message services offering more than three times the capacity compared to a standard message.
Abstract: In this paper we obtain the conditions under which the trivial solution is stable for the following perturbed differential system : where _ constants. which described the flow rate of liquid or gases between two vessels, we transform this differential system to auxiliary system which gives the stability conditions of solution by Perron principle, these conditions represent stability conditions for required differential system.
Abstract: This research developed a software which can be used for image compression. This research proposes two methods: the first uses Joint Photographic Experts Group (JPEG), while the second uses artificial neural network (Modified Fuzzy Adaptive Resonance Theory (MFART)) algorithm. This software is applied on two types of images (jpeg and tiff). Several parameters in compression methods are tested, the results reveal that the MFART is better than the JPEG metod. The Root Mean Square Error (ERMS) for MFART method on jpeg image is equal 3.7 but it is equal to 26.09 when JPEG method implement on to the same image. MATLAB has been used in the implementation of this software.
Abstract: The aim of this paper is to find the stability of unified chaotic system through studying different systems. The unified chaotic system is divided into three systems by depending on the values of , when , the unified chaotic system becomes Lorenz system; when; it becomes L system, when ; the unified chaotic system becomes Chen system. Investigations the stability analysis of these systems leads to the stability of the unified chaotic system.
Abstract: In this paper, We solved the system of differential-algebraic equation (DAEs) of index one numerically with Heun's method and operational matrices of Haar wavelet method, When we compared the results of the two methods with the exact solution, show that the operational matrices of Haar wavelet method is more efficiency and it's numerical results near to the exact solution more than the Heun's method, and the solution accuracy of this method is increasing and the error decreases when the number of mesh points and size of matrices increase.
Abstract: A new approach for mobile radio towers is presented in this paper. The use of feed-forward artificial neural network makes it possible to overcome some important disadvantages of previous random distribution of the towers. Our sample implementation is based upon the coordinates of a virtual cell phone towers distributed in Mosul city. The results show that the proposed algorithm is sufficiently accurate for use in planning mobile towers distribution system.
Abstract: A fuzzy system for handwritten numerals recognition using a fuzzy Hough transform technique is presented. The system is an off-line system since the data processed was written before the time of recognition. A data base of 480 patterns of unconstrained (free) handwritten numerals was used in the proposed system. Membership values are determined as fuzzy sets which are defined on the standard Hough transform vector. Manhattan distance measurement has been used to measure the similarity of an input feature vector to a number of numeral pattern classes. The overall recognition accuracy of the system for the ten numerals is 95%.
Abstract: Two new hybrid algorithms have been suggested in this paper, the first one utilizes four formula of self-scaling update matrix was used. The matrix is selected according to Buckley method in each step. The new algorithm has been compared with BFGS standard algorithm by means of (10) multi-dimensional standard functions. As for the second new hybrid algorithm, a new method is used to test the conjugate coefficient (β) which consists of Hestenes Stiefel (HS) and Dai and yuan (DY). Then it is compared with BFGS and PCG algorithms, which uses BFGS update, by means of (10) multi-dimesional standard functions. Numerical results in general indicates the efficiency of the algorithms proposed in this paper by using this number of non-linear functions in this domain.
Abstract: The Stability Analysis of Steady State Solution of Burger equation by using Fourier mode Stability analysis in two cases has been considered , the first one when the amplitude is constant and the second one when the amplitude is variable . In the first case the steady state solution is always stable and the second case is conditionally stable . In the second case the comparison between the analytical solution and numerical solution of Galerkin technique are the same.
Abstract: The w-Wiener polynomials of the cartesian product of K2 with a cycle Ct and with a wheel Wt are obtained in this paper , in which w does not exceed the connectivity of the product graph . The diameter and Wiener index with respect to the width distance -w for K2×Ct and K2×Wt are also obtained .
Abstract: In this paper, an algorithm is proposed to enhance fingerprint image which includes in one of its steps a smoothing process in which the suggested genetic algorithms by Mitras and Anwar in 2007 which used image smooth filters in both spatial and frequency domain will be employed to know their efficiency in enhancing and regaining the damaged sides of the fingerprint image to remove two types of noise, first one deals with noise added to the image, and the second one the noise already found in the image. Then histogram technique is used to enhance the fingerprint image.
Abstract: This research present four methods to compress digital images using clustering based on artificial intelligent techniques that include neural network, fuzzy logic and hybrid between them. To enhance the performance of the compression system, the first method was developed in two types (k-means 1 dimension run length encoding km1D, k-means 2 dimension run length encoding km2D) by applying traditional clustering algorithm k-means on color and gray level images and then apply compression algorithm RLE in one and two dimension by zigzag scanning to obtain compressed image. The second method (fuzzy c-mean 1dimension run length encoding fcm1D, fuzzy c-mean 2dimension run length encoding fcm2D) used fuzzy c-mean to apply clustering operation and then compression. The third method (kohonen 1 dimension run length encoding Koh1D, kohonen 2dimension run length encoding Koh2D) used kohonen neural network for clustering image and then used RLE. The fourth developed method (fuzzy kohonen 1dimension run length encoding fKoh1D, fuzzy kohonen 2dimension run length encoding fKoh2D) based on hybrid kohonen neural network and fuzzy logic i.e fuzzy kohonen network which is recognized as the best method among the four methods. The four compression methods that are implemented in this research are efficient when applied on gray level and color images.
Abstract: The research tackles newly suggested method in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key other wise,Genetic Algorithm (GA) are used to produce the key stream. The proposed method used new structure style to hide the encrypted key withen the text. In addition simple hash function is used to check the integrity of the empeded encrypted key.
Abstract: Evaluation of a maxwellian Electrons Energy Distribution Function (EEDF) in plasma glow discharge in air has been done. It includes the design of computerized system which depends on one of the intelligent techniques (Fuzzy logic). Their input and output consists of linguistic variables which describe the fundamental parameters (Energy, Pressure, Discharge current) of glow discharge process in different glow discharge regions (Cathode fall region, positive column region). It is suggested in this study that three different types of Gaussian membership function in different forms for each variable. The results seem to be compatible with other published researches, making use of the MATLAB scientific software version (R2006a).