Volume 6, Issue 3, Summer and Autumn 2009, Page 11-226


New low storage VM-algorithm for constrained optimization

Abbas Y. Al-Bayati; Hamsa Th. Chilmerane

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 11-19
DOI: 10.33899/csmj.2009.163817

In this paper a new low-storage VM-algorithm for constrained optimization is investigated both theoretically and experimentally. The new algorithm is based on both the well-known Fletcher's low storage algorithm which generates columns Z spanned on the gradient vectors g1, g2, ... gn  and the idea of both Buckley and LeNir of combined variable storage-conjugate gradient method. The well-known SUMT algorithm is adapted to implement the new idea. The new algorithm is very robust compared with the standard low-storage Fletcher algorithm and the standard SUMT algorithm which was designed for solving constrained problems, of the    numerical results of application very promising.
 

New conjugacy condition with pair-conjugate gradient methods for unconstrained optimization

Abbas Y. Al-Bayati; Huda I. Ahmed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 21-35
DOI: 10.33899/csmj.2009.163818

Conjugate gradient methods are wildly used for unconstrained optimization especially when the dimension is large. In this paper we propose a new kind of nonlinear conjugate gradient methods which on the study of Dai and Liao (2001), the new idea is how to use the pair conjugate gradient method with this study (new cojugacy condition) which consider an inexact line search scheme but reduce to the old one if the line search is exact. Convergence analysis for this new method is provided. Our numerical results show that this new methods is very efficient for the given ten test function compared with other methods.
 

A New Binary Mathematical Programming Problem Model for Mobile Communication

Abdul-Rahim K. Alharithi; Dana A. Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 37-47
DOI: 10.33899/csmj.2009.163819

The aim of this study is to determine the number of base slatlons and  capacity of each base station to satisfy the increased traffic demand and serving all traffic demand areas with a sufficient number of base stations, which is using a minimum number of base stations in order to minimize the total cost.
            The problem is formulated as a binary linear program ming problem, and is solved by a specific algorithm. For this reason, we have built a specific algorithm to solve the model, with programming this algorithm by using Microsoft Access using Visual Basic applications, which has ability to have a decision about any changes and fluctuations.
            Advantages of the algorithm can obtain best (optimum) solution with least steps.
            Computational results show that the proposed model is highly effective and it is applicable, as well.
            For (30) candidate base stations and (15) TDAs, we have applied the model with low costs differ by (10 unit $) with satisfying the required demand for all TDAs.
 

On Idempotent Elements

Nazar H. Shuker; Alaa Hammodat

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 49-56
DOI: 10.33899/csmj.2009.163820

In this paper we study idempotent elements, we give some new properties of idempotent elements and provide some exam we also study central idempotent elements and orthogonal idempotent elements and give some new properties of such idempotent.
         Finally we study special ring which satisfies the property  
for all x in R and n is a positive integer, we represent such ring in termes of idempotent and nilpotent elements.
 

On GP- Ideals

Raida D. Mahmood; Shahla M. Khalil

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 57-63
DOI: 10.33899/csmj.2009.163821

In this work we give some new properties of GP- ideals as well as the relation between GP- ideals, - π regular and simple ring. Also we consider rings with every principal ideal are GP- ideals and establish relation between such rings with strongly  regular and local rings.
 

Solving Multi-Objective Complementary Programming Problem (MOCPP) by using Optimal Average

Najmaddin A. Sulaiman; Abdul-Qader O. Hamadamin

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 65-79
DOI: 10.33899/csmj.2009.163823

In this paper, we suggested an approach to solve Multi-Objective Complementary Programming Problem (MOCPP) by using optimal average (OAV). The computer application of algorithm also has been demonstrated by flow-chart and solving a numerical examples by using MATHLABR2006a, and shown results in tables.
 

Using Predictor-Corrector Methods for Numerical Solution of System of Non-linear Volterra Integral Equations of Second Kind

Borhan F. Jumaa; Abbas H. Taqi

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 93-109
DOI: 10.33899/csmj.2009.163825

The aim of this paper is solving system of non-linear Volterra integral equations of the second kind (NSVIEK2) numerically using Predictor-Corrector methods (P-CM). Two multistep methods (Adams-Bashforth, Adams-Moulton). Convergence and stability of the methods are proved and some examples are presented to illustrate the methods. Programs are written in matlab program version 7.0.
 

Enhancing Cost and Security of Arabic SMS Messages over Mobile Phone Network

Abdullah A. Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 111-127
DOI: 10.33899/csmj.2009.163826

This paper investigates a novel algorithm for compressing and encrypting Arabic short text messages (SMS messages). Short text messages are used in cellular networks. Compression is required for saving the transmission energy or to use bandwidth in an efficient manner in addition to save the user money while the end-to-end effective encryption is required for security providence. This work succeeded to overcome small size limitation of the SMS message by changing Arabic characters coding from Unicode to Base64 coding scheme and developing a runt version of lossless Huffman coding scheme. Examples are shown where the application of the text compressor for short message services offering more than three times the capacity compared to a standard message.
 

Stability Conditions for Flow Rate of Liquid Between Two Vessels

Thair Y. Thanoon; Nagham N. Hana

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 141-150
DOI: 10.33899/csmj.2009.163828

In this paper we obtain the conditions under which the trivial solution is stable for the following  perturbed differential system :



 


 
 



 
 
 
 
 
 
 
where _ constants. 
which described the flow rate of liquid or gases between two vessels, we transform this differential system to auxiliary system which gives the stability conditions of solution by Perron principle, these conditions represent stability conditions for required differential system.
     

Image compression using Modified Fuzzy Adaptive Resonance Theory

Ielaf O. abdl-majjed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 151-160
DOI: 10.33899/csmj.2009.163829

This research developed a software which can be used for image compression. This research proposes two methods: the first uses Joint Photographic Experts Group (JPEG), while the second uses artificial neural network (Modified Fuzzy Adaptive Resonance Theory (MFART)) algorithm. This software is applied on two types of images (jpeg and tiff). Several parameters in compression methods are tested, the results reveal that the MFART is better than the JPEG metod. The Root Mean Square Error (ERMS) for MFART method on jpeg image is equal 3.7 but it is equal to 26.09 when JPEG method implement on to the same image. MATLAB has been used in the  implementation of this software.
 

Stability Analysis of Unified Chaotic System

Saad Fawzi AL-Azzawi

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 161-171
DOI: 10.33899/csmj.2009.163830

The aim of this paper is to find the stability of unified chaotic system through studying different systems. The unified chaotic system is divided into three systems by depending on the values of   , when    , the unified chaotic system becomes Lorenz system; when; it becomes L system, when    ; the unified chaotic system becomes Chen system. Investigations the stability analysis of these systems leads to the stability of the unified chaotic system.
 

Comparison between the Heun's and Haar Wavelet Methods for solution Differential-Algebraic Equations (DAEs)

Abdulghafor M. Al-Rozbayani; Ahmed F. Qasem

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 183-196
DOI: 10.33899/csmj.2009.163832

In this paper, We solved the system of differential-algebraic equation (DAEs) of index one numerically with Heun's method and operational matrices of Haar wavelet method, When we compared the results of the two methods with the exact solution, show that the operational matrices of Haar wavelet method is more efficiency and it's numerical results near to the exact solution more than the Heun's method, and the solution accuracy of this method is increasing and the error decreases when the number of mesh points and size of matrices increase.
 

An Algorithm for the Best Way Connection among Cell-Phone Towers Using Feedforward Neural Network

Kais I. Ibraheem; Thamir Abdul Hafed Jarjis; Yahya Q. Ibrahim

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 197-209
DOI: 10.33899/csmj.2009.163833

A new approach for mobile radio towers is presented in this paper. The use of feed-forward artificial neural network makes it possible to overcome some important disadvantages of previous random distribution of the towers.
Our sample implementation is based upon the coordinates of a virtual cell phone towers distributed in Mosul city. The results show that the proposed algorithm is sufficiently accurate for use in planning mobile towers distribution system.
 

Off-line Recognition of Unconstrained Handwritten Numerals Using Fuzzy Hough Transform

Mohammed Z. Khedher; Ghayda A.A. Al-Talib; Shayma M. Al mashhadany

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 211-226
DOI: 10.33899/csmj.2009.163834

A fuzzy system for handwritten numerals recognition using a fuzzy Hough transform technique is presented. The system is an off-line system since the data processed was written before the time of recognition. A data base of 480 patterns of unconstrained (free) handwritten numerals was used in the proposed system. Membership values are determined as fuzzy sets which are defined on the standard Hough transform vector.
Manhattan distance measurement has been used to measure the similarity of an input feature vector to a number of numeral pattern classes. The overall recognition accuracy of the system for the ten numerals is 95%.
 

New Hybrid Quasi-Newton Algorithms for Large Scale Optimization

Abbas Y. Al-Bayati; Sawsan S. Ismail

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 11-24
DOI: 10.33899/csmj.2009.163835

Two new hybrid algorithms have been suggested in this paper, the first one utilizes four formula of self-scaling update matrix was used. The matrix is selected according to Buckley method in each step. The new algorithm has been compared with BFGS standard algorithm by means of (10) multi-dimensional standard functions.
As for the second new hybrid algorithm, a new method is used to test the conjugate coefficient (β) which consists of Hestenes Stiefel (HS) and Dai and yuan (DY). Then it is compared with BFGS and PCG algorithms, which uses BFGS update, by means of (10) multi-dimesional standard functions.
            Numerical results in general indicates the efficiency of the algorithms proposed in this paper by using this number of non-linear functions in this domain.
 

Stability Analysis for Steady State Solutions of Burger Equation

Saad Abdullah Manna; Badran Jassim Salem

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 25-36
DOI: 10.33899/csmj.2009.163836

The Stability Analysis of Steady State Solution of Burger equation by using Fourier mode Stability analysis in two cases has been considered , the first one when the amplitude is constant and the second one when the amplitude is variable .
In the first case the steady state solution is always stable and the second case is conditionally stable . In the second case the comparison between the analytical solution and numerical solution of Galerkin technique are the same.
 

w-Wiener polynomials of Width Distance for Cartesian Product K2 with Cycle and Wheel

Ali Aziz Ali; Asma Salah Aziz

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 37-55
DOI: 10.33899/csmj.2009.163837

The w-Wiener polynomials of the cartesian product of K2 with a cycle  Ct  and with a wheel Wt are obtained in this paper , in which  w does not exceed the connectivity of the product graph . The diameter and Wiener index with respect to the width distance -w  for K2×Ct   and K2×Wt are also obtained .
 

Enhance Fingerprint Image by Using Genetic Algorithms

Ban Ahmed Mitras; Daliya Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 57-73
DOI: 10.33899/csmj.2009.163838

In this paper, an algorithm is proposed to enhance fingerprint image which includes in one of its steps a smoothing process in which the suggested genetic algorithms by Mitras and Anwar in 2007 which used  image smooth filters in both spatial and frequency domain will be employed to know their efficiency in enhancing and regaining the damaged sides of the fingerprint image to remove two types of noise, first one deals with noise added to the image, and the second one the noise already found in the image. Then histogram technique is used to enhance the fingerprint image.
 

Image Compression Based on Artificial Intelligent Techniques

Shahbaa I. Khaleel; Baydaa I. Khaleel; Alaa I. khaleel

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 75-109
DOI: 10.33899/csmj.2009.163839

This research present four methods to compress digital images using clustering based on artificial intelligent techniques that include neural network, fuzzy logic and hybrid between them. To enhance the performance of the compression system, the first method was developed in two types (k-means 1 dimension run length encoding km1D, k-means 2 dimension run length encoding km2D) by applying traditional clustering algorithm k-means on color and gray level images and then apply compression algorithm RLE in one and two dimension by zigzag scanning to obtain compressed image. The second method (fuzzy c-mean 1dimension run length encoding fcm1D, fuzzy c-mean 2dimension run length encoding fcm2D) used fuzzy c-mean to apply clustering operation and then compression. The third method (kohonen 1 dimension run length encoding Koh1D, kohonen 2dimension run length encoding Koh2D) used kohonen neural network for clustering image and then used RLE. The fourth developed method (fuzzy kohonen 1dimension run length encoding fKoh1D, fuzzy kohonen 2dimension run length encoding fKoh2D) based on hybrid kohonen neural network and fuzzy logic i.e fuzzy kohonen network which is recognized as the best method among the four methods. The four compression methods that are implemented in this research are efficient when applied on gray level and color images.
 

Stream Cipher Using Genetic Algorithm

Melad jader saeed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 111-126
DOI: 10.33899/csmj.2009.163840

The research tackles newly suggested method  in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key other wise,Genetic Algorithm (GA) are used to produce the key stream.
The proposed method used new structure style to hide the encrypted key withen the text. In addition simple hash function is used to check the integrity of the empeded encrypted key.
 

Evaluation of Electrons Energy Distribution Function by Fuzzy Logic

Nabhan A. Hamdon

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 6, Issue 3, Pages 127-144
DOI: 10.33899/csmj.2009.163841

Evaluation of a maxwellian Electrons Energy Distribution Function (EEDF) in plasma glow discharge in air has been done. It includes the design of computerized system which depends on one of the intelligent techniques (Fuzzy logic). Their input and output consists of linguistic variables which describe the fundamental parameters (Energy, Pressure, Discharge current) of glow discharge process in different glow discharge regions (Cathode fall region, positive column region). It is suggested in this study that three different types of Gaussian membership function in different forms for each variable. The results seem to be compatible with other published researches, making use of the MATLAB scientific software version (R2006a).