Volume 17 (2023)
Volume 16 (2022)
Volume 15 (2021)
Volume 14 (2020)
Volume 13 (2019)
Volume 12 (2018)
Volume 11 (2014)
Volume 10 (2013)
Volume 9 (2012)
Volume 8 (2011)
Volume 7 (2010)
Volume 6 (2009)
Volume 5 (2008)
Volume 4 (2007)
Volume 3 (2006)
Volume 2 (2005)
Volume 1 (2004)
Number of Articles: 30
A Modified Augmented Lagrange Multiplier Method for Non-Linear Programming
Page 13-25
On Completely YJ-injective Rings
Page 27-32
New Conjugacy Coefficient for Conjugate Gradient Method for Unconstrained Optimization
Page 33-46
The n-Hosoya Polynomials of the Composite of Some Special Graphs
Page 47-62
A Series of Saddle - Node Bifurcation and Chaotic Behavior of a Family of a Semi - Triangular Maps
Page 63-77
Design and Implementation of Distributed Real-time Security System via Mobile Technology
Page 79-99
Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem
Page 101-112
Solution of Nonlinear 2nd Order Multi-Point BVP By Semi-Analytic Technique
Page 113-121
Classification of Zero Divisor Graphs of a Commutative Ring With Degree Equal 7 and 8
Page 123-127
Convergence Analysis of The Finite Difference Solution for Two Dimensions Coupled-Benjamin-Bona-Mahony System
Page 129-141
Stability Analysis for Inclined Channel by an Angle 30◦ with The Presence of Magnetic Field
Page 143-152
An Application of He's Variational Iteration Method for Solving Duffing - Van Der Pol Equation
Page 153-163
On Some Properties of Functions on Convex Galaxies
Page 165-170
Modifying Explicit Finite Difference Method by Using Radial Basis Function Neural Network
Page 171-186
Study Conditions of Center of Gravity for Trivial Solution to Semi Linear Differantial Equation of Third Order in The One Critical Cases
Page 13-23
n-Hosoya polynomials for Pentagonal Chains
Page 25-42
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers
Page 43-60
Designing an Eelectronic Transmission System Using the Information and Communication Technology Infrastructure "A Proposed Model for the Intranet at the University of Mosul"
Page 61-80
Scansion Text Written in English language and Recognized Printed English Character using Bidirectional Associative Memory Network
Page 81-94
Classification of Web Pages by Using Particle Swarm Optimization Algorithm
Page 95-112
Hiding Information using Replacement in Silent Mutation of DNA Sequences
Page 113-134
Compress Digital Image based on Genetic Meta-Heuristic algorithm
Page 135-143
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Page 145-158
Face Detection in a Video File Based on Matching Face Template
Page 159-172
Representation of a Distributed Database System for the Medical Purposes Using Oracle
Page 173-187
Programming Mobile Applications
Page 189-202
Genetic Linear Averaging Algorithm for Zooming Digital Images
Page 203-218
Measurement of the Efficiency of Parallel Genetic Algorithm for Compress and Decompression of Fractal Imaging Using Multiple Computers
Page 219-232
Stability Analysis of the Flow of Blood in the Branching and Stenoted Arteries
Page 233-242
Chaotic Watermarking for Authentication
Page 243-257