Volume 7 Issue 2

Published: 2025-06-25

Contents


Research Paper
Integration of Multispectral Images Using Two-Dimensional Wavelet Transformation

Firas A. Al-Druzy,

Image fusion is an effective tool to integrate multi-source image, where the purpose of the process access to information integration concept, and make the resulting image more suited to human...

Pages: 89-99
The Effects of Correlated Data and Correction Procedures for F-Test in Unbalanced Two Way Model

Ivan S. Kababchi,

Independence of observations is one of the standard assumption in analysis of Variance (ANOVA) table. Where the error terms in the model are independent, identically distributed normal variables...

Pages: 13-28
A Suggested Point Search Algorithm for Circle Detection in Binary Images

Sundus Khaleel Ebraheem,

Detecting circles is very important in the application of image processing especially in determining the object locations. In this paper, a new algorithm is proposed for circle detection, called...

Pages: 79-94
Unsteady Flow near the Junction Zone of Three Liquids

Joseph G. Abdulahad, Rutayna J. Eisa,

In this paper we consider the motion near the junction zone of three approximately plane liquid films of semiinfinite extent in two dimensional polar coordinate system with negligible inertia. We...

Pages: 119-128
The Existence, Uniqueness And Upper Bounds For Errors Of Six Degree Spline Interpolating The Lacunary Data (0,2,5)

Abbas Y. Al-Bayati, Rostam K. Saeed, Karwan H. Jwamer,

The object of this paper is to obtain the existence, uniqueness and upper bounds for errors of six degree spline interpolating the lacunary data (0,2,5). We also showed that the changes of the...

Pages: 49-57
Representation of a Standard Continuous Function by a Microscope

Tahir H. Ismail, Hind Y. Saleh,

The aim of this paper is to provide a representation of a standard continuous function and a standard differentiable function by mean of a microscope. More precisely, under certain conditions, the...

Pages: 115-124
New Hybrid (Oren- Al-Bayati) Self-Scaling Algorithm With Armijo Line-Search

Abbas Y. Al-Bayati, Runak M. Abdullah

In this paper the development, and numerical testing of a class of self-scaling Quasi-Newton update with adaptive step - size are presented . In our work a new combined (Oren-Al-Bayati)...

Pages: 39-47
A Proposed Method to Minimize the Flow Time Average and the Due Date Average in Sequence Problem

Ghazwan H. Mahmoud

The problem tackled in this research is to propose a method to minimize the flow time average and the due date average to resolve the sequence problem. Assuming that we have a set of jobs, and...

Pages: 61-75
MGP and EGP Rings

Raida D. Mahmood, Shahla M. Khalil,

The purpose of this paper is to study the rings in which every maximal (essential) right ideal is a left GP- ideal. Such rings will be called right MGP- rings (EGP- rings). We give the basic...

Pages: 59-65
Numerical Solution for Sine-Gordon System in One Dimension

Saad A. Manna, Haneen T. Jassim,

This paper has studied the numerical solution for Sine-Gordon system in one dimensions using finite difference methods. We have used Explicit method and Crank-Nicholson method.A comparison between...

Pages: 47-59
Some Results in the Theory of Fractional Order Integro-Differential Equation with Boundary Conditions

Azzam S. Younes,

This paper deals with the existence and uniqueness of the solution for a boundary value problem of fractional order integro-differential equation, when using Banach fixed point theorem and Shafers...

Pages: 101-114
A New Algorithms in Mixed Integer Programming Problems

Abbas Y. Al-Bayati, Basim A. Hassan,

ABSTRACT In this paper we have studied two new algorithms for solving mixed IPP. In the 1st algorithm we have investigated a new short technique for searching to the efficient cut in the standard...

Pages: 13-29
The Minimal Blocking Set Of Size 22 In PG ( 2 , 13 )

Farah H. Kadoo,

A blocking set B in projective plane PG (2, ) in a set of points such that every line in the plane intersect B in at least one point and there exist a line intersect B in only one point, we say...

Pages: 77-88
Voice Security Using Hybrid Algorithm

Alyaa Moufaq Abdul Majeed Haleem,

This research deals with constructing and implementing a new digital voice security Algorithm based on hiding large amount of data (sound file) in a 24 bits host color image (RGB image). The...

Pages: 107-118
Design a Fuzzy Expert System for Liver and Pancreas Diseases Diagnosis

Baydaa S Bhnam

Fuzzy logic is a branch of artificial intelligence techniques, it deals with uncertainty in knowledge that simulates human reasoning in incomplete or fuzzy data. Fuzzy relational inference that has...

Pages: 129-141
Develop Parallel Arithmetic Operations for Binary Modified Signed-Digit System Using Two-Step Algorithm

Wijdan Yassin A. Al Karim,

An optical computing system is expected to be a powerful information processing system that takes full advantage of optics, such as parallelism, high speed, and large information capacity....

Pages: 95-105
Stability Analysis of Reaction-Diffusion Equations with Double Diffusivity System

Ahmed F. Kasem, Saad A. Manna

Stability analysis for steady state solution of reaction-diffusion equations with double diffusivity discuss and arise in the solution of problems of flow of homogeneous liquids and heat conduction...

Pages: 29-37
Wiener Polynomials of the Width Distance for Compound Graphs of G1 ☒ G2

Ali A. Ali, Asma S. Aziz,

For a connected vertex disjoint graphs G1 and G2 , we defineG1 G2 as the graph obtained from the union of G1 and G2 with four edges joining the vertices of an edge of G1 to the vertices of an edge...

Pages: 31-46
Flow of Soap Films on Inclined Plane

Joseph G. Abdulahad,

In this paper a mathematical model is constructed to describe a two dimensional flow for an inclined films with an inclination angle to the horizontal that is drainage under the action of gravity....

Pages: 67-78
New bounds for mr(2,37) and tr(2,37) in PG(2,37)

Hanadi D. Saleem,

In this paper we find the nearest complete (n,r)-arcs to the maximum bound and the minimum sizes for mr(2,37) where and tr(2,37) where .Also we show that not exists (1236,34)-arc and some other...

Pages: 143-150
Application of Traditional Denoising Algorithms to Zoom-In the Color Images

Hanan Hamid Ali,

In this paper many algorithmswereapplied to" zoom in" the images, like traditional algorithms which is used (Linear Averaging) algorithm, (Convolution) algorithm and the proposed algorithms to be...

Pages: 159-171
Studying the Stability of Some Models Combinatory with Application

Abdulghafoor Gasim Salim, Raad Awad Alhamdani,

In this paper we find the statistical properties (Moments) of the harmonic model with additive noise, The stability of the mixed spectra (linear and non-linear models) for special case (low order)...

Pages: 139-157
Hybrid intelligent watermark System

Fardos Adnan Abdalkader, Shahbaa I. Khaleel, Nada N. Saleem,

As a result of the development in data transfer technology a cross multimedia and internet, it has became possible to access and copy these information in unauthentical manner . This leads to...

Pages: 125-138
Multistage Hiding Image Techniques

Nadia M. Mohammed,

In the few recent years computer sciences have been widely developed especially in communication spaces and Internet, therefore, a great need appear for security and safety of our information....

Pages: 151-166
Recognition of Printed Text Based on Hidden Markov Model

Ghayda A.A. Al-Talib, Armanesa Nuaman Hasson

Automatic recognition of printed text is of high importance in modern IT applications. Recognition of text for lateen scripted language is readily in use for a long time. For cursive script...

Pages: 173-188