ISSN: 1815-4816

Volume 10, Issue 2

Volume 10, Issue 2, Spring 2013, Page 13-257


A Modified Augmented Lagrange Multiplier Method for Non-Linear Programming

Abbas Y. Al-Bayati; Eman T. Hamed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 13-25

In this paper, we have investigated a new algorithm which employs an Augmented Lagrangian Method (ALM). It overcomes many of the difficulties associated with the Penalty function method. The new incorporate algorithm has been proved very effective with an efficient convergence criterion.

On Completely YJ-injective Rings

Raida D. Mahmood; Husam Q. Muhammad

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 27-32

A ring R is called completely right YJ-injective (briefly, right CYJ-injective ) if every homomorphic image of R is right YJ-injective. In this paper, we study completely right YJ-injective rings and their connection with Von Neumann regular rings. In addition, we also study regularity of rings whose ring homomorphic images are right YJ-injective as right R-modules.

New Conjugacy Coefficient for Conjugate Gradient Method for Unconstrained Optimization

Hamsa TH. Chilmeran; Huda Y. Najem

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 33-46

In this paper, we derived a new conjugacy coefficient of conjugate gradient method which is based on non-linear function using inexact line searches. This method satisfied sufficient descent condition and the converges globally is provided. The numerical results indicate that the new approach yields very effective depending on number of iterations and number of functions evaluation .

The n-Hosoya Polynomials of the Composite of Some Special Graphs

Ahmed M. Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 47-62

It is not easy to find the n-Hosoya polynomial of the compound graphs constructed in the form G1⊠G2 for any two disjoint connected graphs and .Therefore, in this paper, we obtain n-Hosoya polynomial of G1⊠G2 when is a complete graph and is a special graph such as a complete graph, a bipartite complete, a wheel, or a cycle. The n-Wiener index of each such composite graph is also obtained in this paper.

A Series of Saddle - Node Bifurcation and Chaotic Behavior of a Family of a Semi - Triangular Maps

Ammar A.M. Jameel; Salma M. Faris

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 63-77

This paper studies the bifurcations in dynamics of a family of semi-triangular maps . We will prove that this family has a series of Saddle-node bifurcations and a period doubling bifurcation. Also, we show that for some value of the parameter the functions will be chaotic.

Design and Implementation of Distributed Real-time Security System via Mobile Technology

Dhuha B. Abdullah; Wael W. Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 79-99

In this paper, a distributed real time security system for monitoring and remote control on building and protecting it from unauthorized entering is designed and implemented. This system is based on the transfer of signal in real time when there is a breach and image of an unauthorized person to enter the building to the mobile phone of the person who is responsible for the security of the building.
The real time system consists of three main parts, the first one is the computer with an electronic circuit connected via the serial port. The designed electronic circuit contains the Microcontroller for reading sensors connected to ports of the building (G1, G2, and G3) and processing the signals. Also, there is a monitoring camera to capture an image when registering a case of breach. The program in the computer receives signals from the three ports and uses a fixed real time algorithm for scheduling signals and gives them priorities according to the importance of ports, then sends signals to the second part of the system. The second part of the system consists of a server on the Internet which receives signal and image of the breach, stores it in a database system and then transferring it in real time to the third part. The third part consists of several mobile phones to achieve the principle of distribution for this system, each mobile phone will be responsible for a single port in the building, while there is one mobile phone responsible for all ports which belongs to the person who is responsible for the building security. Each mobile phone contains three programs, the first program would receive a signal of the breach and give the alarm, the second program displays picture, and the third program sends a control signal.

Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem

Ruqaya Z. Sha; ban

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 101-112

The research tackled artificial intelligent methods to solve one of the optimization problems by using artificial ant by applying ant colony optimization algorithm and also tabu search algorithm to find the solution of sliding tile 8-puzzel problem. In ant colony algorithm generated many possible solutions depending on finding the difference tiles in initial state from the goal and moving accordingly in the current state of the problem. In Tabu search, many possible solutions have been generated according to the replacement relation between different tiles in initial state to find the optimal solution from many solutions. In this research, the experimental show is very speed to obtain the goal. The source code is written in MATLAB language to simulate these two algorithms.

Solution of Nonlinear 2nd Order Multi-Point BVP By Semi-Analytic Technique

Luma N.M. Tawfiq; Mariam M. Hilal

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 113-121

ABSTRACT
In this paper, we present new algorithm for the solution of the nonlinear second order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the semi-analytic technique and the solutions are calculated in the form of a rapid convergent series. It is observed that the method gives more realistic series of solutions that converge very rapidly in physical problems. Illustrative examples are provided to demonstrate the efficiency and simplicity of the proposed method in solving this type of multipoint boundary value problems.

Convergence Analysis of The Finite Difference Solution for Two Dimensions Coupled-Benjamin-Bona-Mahony System

Ekhlass S. Al-Rawi; Muhannad A. Mahmoud

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 129-141

This paper is devoted to drive the matrix algebraic equation for the two-dimensional nonlinear coupled-BBM system which is obtained from using the implicit finite difference method. The convergence analysis of the solution is proved. Numerical experiment is presented with initial conditions describing the generation and evolution.

Stability Analysis for Inclined Channel by an Angle 30◦ with The Presence of Magnetic Field

Ahmmed M. Juma; Ala; a A. Hammodat

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 143-152

In this research, we study the stability of a system of partial differential equations which represents fluid flow in an inclined channel and under the influence of a magnetic field perpendicular to the plane of the channel and the presence of radiation coefficients and when the channel has an inclination angle .

An Application of He's Variational Iteration Method for Solving Duffing - Van Der Pol Equation

Ann J. Al-Sawoor; Merna A. Aziz

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 153-163

In this paper, we apply He's variational iteration method (VIM) and the Adomian decomposition method (ADM) to approximate the solution of Duffing-Van Der Pol equation (DVP). In VIM, a correction functional is constructed by a general Lagrange multiplier which can be identified via a variational theory. The VIM yields an approximate solution in the form of a quickly convergent series. Comparisons of the two series solutions with the classical Runge-Kutta order four RK45 method show that the VIM is a powerful method for the solution of nonlinear equations. The convergent of He's variational iteration method to this equation is also considered.

On Some Properties of Functions on Convex Galaxies

Tahir H. Ismail; Barah M. Sulaiman; Hind Y. Saleh

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 165-170

In this paper, we define and study extensively a new type of external sets in , we call it "convex galaxies". We show that these convex external sets may be classified in some definite types. More precisely, we obtain the following :
(1) Let be a convex galaxy which is symmetric with respect to zero, then
(i) is an - galaxy (0) if and only if there exists an internal strictly increasing sequence of strictly positive real numbers with such that and , for all , where, is some limited real number such that .
(ii) is a non-linear galaxy if and only if there exists an internal strictly increasing sequence of strictly positive real numbers with such that is unlimited for all .
(2) Let be a convex galaxy which is symmetric with respect to zero, then
(i) is an - galaxy (0) iff there exists a real internal strictly increasing - function , such that , and for all limited , where is a positive real number.
(ii) is a non-linear galaxy if and only if there exists a real internal strictly increasing - function , such that and is positive unlimited, for all appreciable .

Modifying Explicit Finite Difference Method by Using Radial Basis Function Neural Network

Omar S. Kasim

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 171-186

In this research, we use artificial neural networks, specifically radial basis function neural network (RBFNN) to improve the performance and work of the explicit finite differences method (EFDM), where it was compared, the modified method with an explicit finite differences method through solving the Murray equation and showing by comparing results with the exact solution that the improved method by using (RBFNN) is the best and most accurate by giving less error rate through root mean square error (RMSE) from the classical method (EFDM).