ISSN: 1815-4816

Volume 9, Issue 2

Volume 9, Issue 2, Autumn 2012, Page 13-257

A Combined Cubic and Novel Line Search CG-Algorithm

Abbas Y. Al-Bayati; Hamsa TH. Chilmeran

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 13-24

In this paper a new line search technique is investigated. It uses (cubic and novel) line searches in the standard CG-algorithm for unconstrained optimization. Applying our new modified version on CG-method shows that, it is too effective when compared with other established algorithms, in this paper, to solve standard unconstrained optimization problems.

A New Preconditioned Inexact Line-Search Technique for Unconstrained Optimization

Abbas Y. Al-Bayati; Ivan S. Latif

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 25-39

In this paper, we study the global convergence properties of the new class of preconditioned conjugate gradient descent algorithm, when applied to convex objective non-linear unconstrained optimization functions.
We assume that a new inexact line search rule which is similar to the Armijo line-search rule is used. It's an estimation formula to choose a large step-size at each iteration and use the same formula to find the direction search. A new preconditioned conjugate gradient direction search is used to replace the conjugate gradient descent direction of ZIR-algorithm. Numerical results on twenty five well-know test functions with various dimensions show that the new inexact line-search and the new preconditioned conjugate gradient search directions are efficient for solving unconstrained nonlinear optimization problem in many situations.

Romberg Algorithm to Solve a System of Nonlinear Fredholm Integral Equations of Second Kind

Abbas Y. Al-Bayati; Rostam K. Saeed; Kawa M. Aziz

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 41-52

In this paper, we use Romberg algorithm, to find an approximation solution for a system of nonlinear Fredholm integral equations of the second kind. A comparison between this approximations and exact solutions for four numerical examples are given, depending on the least-square error and running computer time. Our numerical results are obtained by MATLAB 7.0 program and for a system of rank 2×2, 3×3 on Personal Computer P4.

On n-Weakly Regular Rings

Raida D. Mahammod; Mohammed Th. Al-Neimi

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 53-59

As a generalization of right weakly regular rings, we introduce the notion of right n-weakly regular rings, i.e. for all a N(R), a aRaR. In this paper, first give various properties of right n-weakly regular rings. Also, we study the relation between such rings and reduced rings by adding some types of rings, such as NCI, MC2 and SNF rings.

On m-Regular Rings

Zubayda M. Ibraheem; Maha F. Khalaf

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 61-70

As a generalization of regular rings, we introduce the notion, of m-regular rings, that is for all , there is a fixed positive integer m such that is a Von-Neumann regular element. Some characterization and basic properties of these rings will be given. Also, we study the relation-ship between them and Von-Neumann regular rings, -regular rings, reduced rings, locally rings, uniform rings and 2-primal rings.

Local Existence Theorem of Fractional Differential Equations in Lp Space

Joseph Gh. Abdulahad; Shayma A. Murad

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 71-78

We proved the existence of P-integrable solution in -space, where for the fractional differential equation which has the form:

with boundary condition

where is the Caputo fractional derivative, and c are positive constants with . The contraction mapping principle has been used to establish our main result.

Alternating Direction Implicit Method for Solving Parabolic Partial Differential Equations in Three Dimensions

Abdulghafor M. Al-Rozbayani; Mahmood H. Yahya

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 79-97

In this paper, the parabolic partial differential equations in three-dimensions are solved by two types of finite differences, such as, Alternating Direction Explicit (ADE) method and Alternating Direction Implicit (ADI) method. By the comparison of the numerical results for the previous two methods with the Exact solution, we observe that the results of Alternating Direction Implicit (ADI) method is better and nearest to the exact solution compared with the results of Alternating Direction Explicit (ADE) method. we also studied the numerical stability of both methods by Von-Neumann Method.

Design and Implementation of Probabilistic Assignment Management System for a Library Database Using Object Oriented Programming

Jamal M. Hameed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 99-108

Computerized information system has recently become widely available. Indeed, it has become an important instrument that can be applied in different aspects of life. One of the important applications of computer systems is that adopted by commercial organization as well as by small business. Hence, we can say that no management can successfully operate in any business without the use of computerized information system.
This paper aims to design and implement probabilistic assignment management system for a library database commercial library. Most applications of OOP use specialized object oriented languages, but this paper shows that C++ can be used effectively to develop object oriented models of typical library management, and implement OOP is more flexible and reliable and less costing.

Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset

Najlaa B. Aldabagh; Mafaz M. Khalil

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 109-123

Many real world problems involve the simultaneous optimization of various and often conflicting objectives. Evolutionary algorithms seem to be the most attractive approaches for this class of problems, because they are usually population based techniques that can find multiple compromise solution in a single run, and they do not require any hypotheses on the objective functions. Among other techniques, in the last decade a new paradigm based on the emulation of the immune system behavior has been proposed. Since the pioneer works, many different implementations have been proposed in literatures.
This Paper presents a description of an intrusion detection approach modeled on the basis of three bio-inspired concepts namely, Negative selection, Positive selection and complement system. The Positive selection mechanism of the immune system can detect the attack patterns (nonself), while the Negative selection mechanism of the immune system can delete the Artificial lymphocyte (ALC) which interact with normal patterns (Self). The complement system is a kind of the effecter mechanism, which refers to a series of proteins circulating in the blood and bathing the fluids surrounding tissues. It establishes the idea that only those cells that recognize the antigens are selected to undergo two operators: cleave operator and bind operator are presented, cleave operator cleaves a complement cell into two sub-cells, while bind operator binds two cells together and forms a big cell. To obtain Complement detectors can recognize only the attack patterns from the NSL-KDD dataset.

Clustering and Detecting Network Intrusion Based on Fuzzy Algorithms

Manar Y. Kashmola; Bayda I. Khaleel

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 125-138

Clustering or (cluster analysis ) has been widely used in data analysis and pattern recognition. There are several algorithms for clustering large data sets or streaming data sets, Their aims to organize a collection of data items into clusters. These such items are more similar to each other within cluster, and difference than they are in the other clusters. Three fuzzy clustering algorithms (Fuzzy C-Means, Possibilistic C-Means and Gustafson-Kessel algorithms) were applied using kdd cup 99 data set to classify this data set into 23 classes according to the subtype of attacks. The same data set were classified into 5 classes according to the type of attacks. In order to evaluate the performance of the system, we compute the classification rate, detection rate and false alarm rate on this data set. Finally, the results obtained from the experiments with classification rate 100% which has not been obtained in any previous work.

The n-Hosoya Polynomial of Wa (x) Cb

Ahmed M. Ali; Haveen G. Ahmed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 139-150

For a wheel and a cycle the composite graphs ⊠ is constructed from the union of and and adding the edges and , where is an edge of and is an edge of . The n – diameter , the n – Hosoya polynomial and the n – Wiener index of ⊠ are obtained in this paper.

Construct a Simulator of a Proposed Trust and Reputation Model in (PD) P2P File Sharing Systems

Dujan B. Taha; Abdullah M. Salih

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 151-165

Trust concept is an important requirement for sustained interactions between peers, and to deal with malicious peers in P2P file sharing systems. Traditional security mechanisms and services are unable to protect against malicious behaviors, therefore trust and reputation management is considered an appropriate solution that can provide a protection against such threat. In this paper, we focused on the advantage of some existing trust models to formulate a new model that solves problems raised in the previous models. We also considered the partially decentralized (PD) peer-2-peer (P2P) architecture to execute the proposed model. Finally, we construct a C# based simulator to test proposed model on the partially decentralized P2P file sharing network. Simulation results show that the model is able to identify malicious peers effectively and isolate them from the system (sharing files), hence reducing the amount of inauthentic uploads and increasing peers’ satisfaction.

Extraction and Recognition of Color Feature in true Color Images Using Neural Network Based on Colored Histogram Technique

Orjuwan M.A. Aljawadi

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 167-181

In this research, a neural network using backpropagation (BPNN) algorithm was trained and learned to work as the cone cells in human eyes to recognize the three fundamental cells’ colors and hues, as the neural network showed good results in training and testing the color feature it was trained and learned again to recognize two nature scenes images ; Red sunset and Blue sky images where both scenes images contain color interaction and different hues such as red-orange and blue-violet. The recognition process was based on color histogram technique in colored images which is a representation of the distribution of colors in an image by counting the number of pixels that have colors in each of a fixed list of color ranges, that span the image's color space , all possible colors in the image. The importance of this research is based on developing the ability of (BPNN) in images ‘objects recognition based on color feature that is very important feature in artificial intelligence and colored image processing fields from developing the systems of alarms robots in fire recognition , medical digenesis of tumors, certain pattern’s recognition in different segments of an image , face and eyes’ iris recognition as a part of security systems , it helps solve the problem of limitation of recognition process in neural networks in many fields.

A Hybrid Algorithm from Cuckoo Search Method with N-Queens Problem

Isra N. Alkallak

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 183-192

This paper tackled cuckoo search method. The method is one of optimization methods with N-queens problem through proposed hybridization algorithm which mimics the behavior of cuckoo to reach the solution of N-queens problem. The proposed hybridization algorithm is simulated by using MATLAB 6.5 language to mimic the behavior of some cuckoo. These laid their eggs in the nests of other host birds. If a host bird discovers that the eggs aren't their own, it will either throw these alien eggs away, or abandon its nest and build a new one. To reach the solution for N-queens problem easily. The experimental results in this paper show the effectiveness and easy implementation to reach solution

Construct a Tool for Aspect-Oriented Analysis and Design Based on Theme Approach

Mohammad H. Abdulwahab; Nada N. Saleem

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 193-208

In this research, a (RADC-AO) tool was constructed and implemented for the requirements analysis, design and stub-code generation according to aspect-oriented (AO) concepts based on theme approach. RADC-AO automatically identifies crosscutting concerns in natural language requirements text by using natural language processing (NLP), analyze requirements and apply a set of operations on themes got in the analysis process, design classes and aspects, draw class diagram, and generates stub-code.
RADC-AO tested by input complete informal text requirements for payroll system (that contains security, logging, authorization, in addition to its core functionality which includes employees information entering, loans information entering, and payment calculation), RADC-AO successes in the test and gives good results.

Thin Films Flow Driven on an Inclined Surface

Khider M.S. Khider

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 209-217

The flow of unsteady incompressible two dimensional system flow of a thin liquid films with negligible inertia is investigated. Continuity equation and Navier-Stokes equations are used to obtain the equation that governs this type of flow.

On iα - Open Sets

Amir A. Mohammed; Omar y. kahtab

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 219-228

In this paper, we introduce a new class of open sets defined as follows: A subset A of a topological space is called iα-open set, if there exists a non-empty subset O of X, , such that . Also, we present the notion of iα-continuous mapping, iα-open mapping, iα-irresolute mapping, iα-totally continuous mapping, i-contra-continuous mapping, iα-contra-continuous mapping and we investigate some properties of these mappings. Furthermore, we introduce some iα-separation axioms and the mappings are related with iα-separation axioms.

Generating a New Hyperchaotic Pan System Via State Feedback Control

Saad F. AL-Azzawi

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 229-241

This paper proposes a new four-dimensional continuous autonomous hyperchaotic system based on the 3D Pan system by introducing a nonlinear state feedback controller. Dynamical behaviors of the new system are analyzed, both theoretically and numerically, including equilibrium points, Lyapunov exponents spectrum stability and bifurcation , finally, an illustrative example is given.

Numerical Solution of a Reaction-Diffusion System with Fast Reversible Reaction by Using Adomian’s Decomposition Method and He’s Variational Iteration Method

Ann J. Al-Sawoor; Mohammed O. Al-Amr

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 9, Issue 2, Pages 243-257

In this paper, the approximate solution of a reaction-diffusion system with fast reversible reaction is obtained by using Adomian decomposition method (ADM) and variational iteration method (VIM) which are two powerful methods that were recently developed. The VIM requires the evaluation of the Lagrange multiplier, whereas ADM requires the evaluation of the Adomian polynomials. The behavior of the approximate solutions and the effects of different values of are shown graphically.