Volume 2 Issue 1

Published: 2025-06-25

Contents


Research Paper
Recognition English Letters Using Invariant Moment in Extracting Properties of Images

Hadia Saleh Abdulla,

In this research, a study of printed English characters properties for Optical Character Recognition is done using the invariant moment method to evaluate the character properties due to its...

Pages: 69-82
Integration Method with Backpropagation

Nidhal H. Al-Assady, Jamal S. Majeed, Shahbaa I. Khaleel,

In this research, a new method is discovered (combined method) to accelerate the backpropagation network by using the expected values of source units for updating weights, we mean the expected...

Pages: 49-68
On Generalized Simple P-injective Rings

Nazar H. Shuker, Raida D. Mahmood,

In this work, we study generalized simple P-injective rings. New properties of such rings are given, and a characterization of division rings and strongly regular rings in terms of GSP rings is...

Pages: 21-26
Superposition Method with the Principle of Multiple Shooting for Solving Stiff Linear Initial Value Problems

Basheer M.S. Khalaf, Suhaib A. Al-Tamr,

The main objective of this paper is the development of a new technique for solving stiff Linear Initial Value Problems (IVPs) in Ordinary Differential Equations (ODEs), The new Technique consists...

Pages: 11-26
Numerical Solution and Stability Analysis of Huxley Equation

Saad A. Manaa, Mohammad Sabawi,

The numerical solution of Huxley equation by the use of two finite difference methods is done. The first one is the explicit scheme and the second one is the Crank-Nicholson scheme. The comparison...

Pages: 85-97
On Rings whose Simple Singular R-Modules are GP-Injective

Zubayda M. Ibraheem,

In this work we give a characterization of rings whose simple singular right R-modules are Gp-injective. We prove that if R is a quasi-duo ring whose simple singular right R-modules are...

Pages: 63-67
Automatic Super-linear Self-Scaling VM-algorithm

Abbas Y. Al-Bayati, Maha S. Al-Salih,

In this paper, a new self-scaling VM-algorithm for unconstrained non-linear optimization is investigated. Some theoretical and experimental results are given on the scaling technique, which...

Pages: 39-52
Implementation of Object Relational Data Base Management on Depreciation System Using ORACL

Asmaa Yaseen Hammo, Alaa F. Saeed,

This research implements concept of Object Relational DataBases Management System ORDBMS on depreciation system because its considered as a complex model. ORDBMS abstracts the level of writing...

Pages: 83-98
Controlling the Security Objects Properties for Networks in Windows 2000

Dhuha Basheer Abdullah, Abd-Alnaseer Ahmed

Information security occupies a wide area in designing network operating systems. Windows 2000 was of the operating systems that offered great interest for network security, so it is recently...

Pages: 27-48
Fractal Dimension Calculation for the General Shapes of ‎Geographical Maps and Closed Curves

Rayan Yousif Alkhayat, Basil Younis Thanoon

This research includes building a software to calculate the Fractal Dimension of the general shapes of the borders of geographical maps as well as closed curves. Two methods are adopted for...

Pages: 99-114
Stability of Liquid Film with Negligible Viscosity

Hamsa D. Saleem,

In this paper, we consider the stability analysis for a disturbed unsteady flow, which is two-dimensional incompressible flow in a symmetric film where the effect of viscosity can be neglected in...

Pages: 11-19
New Hybrid CG Algorithm Based on PR and FR Steps

Abbas Y. Al-Bayati, Khalil K. Abbo, Asma M. Abdalah,

In this paper, a new hybrid conjugate gradient algorithm is proposed for unconstrained optimization. This algorithm combines the desirable computation aspects of Polak-Ribire steps and useful...

Pages: 27-38
Stability Analysis for Steady State Solutions of Huxley Equation

Mohammad Sabawi, Saad A. Manaa,

Stability analysis of steady state solutions of Huxley equation using Fourier mode stability analysis in two cases is investigated. Firstly when the amplitude is constant and secondly when the...

Pages: 69-84
New Method to Reduce the Size of Codebook in Vector Quantization of Images

Sahar K. Ahmed,

The vector quantization method for image compression inherently requires the generation of a codebook which has to be made available for both the encoding and decoding processes. That necessitates...

Pages: 53-62
Best Design for Courtyard Occupied Using Computer

Abdul Satar J. Abdul Latif, Abdul Aziz S. Khalil, Alyaa Moufaq Abdul Majeed Haleem,

The courtyard occupied a great importance in the architectural constructions in olden times and recently, especially in the Arab and Islamic architecture, due to their large atmospheric benefits....

Pages: 115-138