Volume 6 Issue 2
Published: 2025-06-25
Contents
Research Paper
On Representation Theorem for Algebras with Three Commuting Involutions
Amir A. Mohammed, Baida S. Abdullah, Nadwa S. Younis,
Algebras with three commuting involutions are represented as commutants of one-generated subalgebras of algebras of vector-space endomorphisms where and are involutions of a prefixed type.
Hosoya Polynomials of Steiner Distance of the Sequential Join of Graphs
Herish O. Abdullah,
The Hosoya polynomials of Steiner n-distance of the sequential join of graphs and are obtained and the Hosoya polynomials of Steiner 3-distance of the sequential join of m graphs are also obtained.
A Generalized Curvature of a Generalized Envelope
Tahir H. Ismail, Ibrahim O. Hamad,
In this paper we study one of the applications of a generalized curvature [3] on the generalized envelope of a family of lines given in [7], [8], using some concepts of nonstandard analysis given...
Detection of Face Direction by Implementing Face Edge Patterns
Jarjees A. Khidir,
In this paper, a method for detecting the direction of a human face is developed; regardless of its age or sex. The method involves creating a set of five face patterns representing the front, up,...
Using the Improvement of the Fixed Point Iterative Method in Solving Fredholm Integral Equations
Abbas Y. Al-Bayati,
In this paper an iterative method for the fixed point is used to obtain an approximation solution for the Fredholm integral equations of the second kind by using several problems with different...
Face Recognition using Artificial Intelligent Techniques
Laheeb Mohammad Ibrahim, Ibrahim A. Saleh,
Face recognition is considered one of the visual tasks which humans can do almost effortlessly while for computers it is a difficult and challenging task. This research deals with the problem of...
On New Conjugate Pair Method
Abbas Y. Al-Bayati, Nidhal Al-Assady, Ban Ahmed Mitras,
This paper involves the combination between the conjugate pair and hybrid conjugate gradient methods. The new combined algorithm is based on exact line search and it is examined by using different...
A Hybrid Ant Colony Optimization Algorithm to Solve Assignment Problem by Hungarian Method
Isra N. Alkallak,
This research studied ant colony optimization with optimization problem as an assignment model problem by Hungarian method. The proposed heuristic algorithm simulate ant colony optimization...
Artificial Intelligent Techniques with Watermarking
Nada N. Saleem, Baydaa I. Khaleel, Shahbaa I. Khaleel,
This research presents three robust blind watermarking algorithms in the discrete wavelet transform and spatial domain based on neural network and fuzzy logic artificial intelligent techniques. To...
Linear Codes Arise From New Complete (n,r)-arcs in PG(2,29)
Shuaa Aziz,
This paper presents the recently-discovered linear [n,3,d] codes over PG(2,29) that arises from a complete (n,r)-arcs which the paper[12] presented it for the first time. The aim of this paper is...
Stability Analysis of Convection & Diffusion equation
Saad Abdullah Manna, Badran Jassim Salem,
The Stability Analysis of Convection& Diffusion equation by using Fourier mode Stability analysis in two cases has been considered , the first one when the amplitude is constant and the second...
Iris Recognition System Based on Wavelet Transform
Maha A. Hasso, Bayez K. Al-Sulaifanie, Kaydar M. Quboa,
In order to provide accurate recognition of individuals, the most discriminating information present in an iris pattern must be extracted. Only the significant features of the iris must be encoded...
Joint Numerical Range of Matrix Polynomials
Ahmed M. Sabir,
Some algebraic properties of the sharp points of the joint numerical range of a matrix polynomials are the main subject of this paper. We also consider isolated points of the joint numerical range...
Numerical Solution and Stability Analysis for Burger's-Huxley Equation
Saad A. Manaa, Farhad M. Saleem,
The Burgers-Huxley equation has been solved numerically by using two finite difference methods, the explicit scheme and the Crank-Nicholson scheme. A comparison between the two schemes has been...
Using the Update of Conditional BFGS in Constrained Optimization
Abbas Y. Al-Bayati, Ban Ahmed Mitras,
In this paper, we have used one of the preconditioned conjugate gradient algorithm with the Quasi Newton approximation; namely the BFGS preconditioned algorithm which was suggested by (AL-Bayati...
Remove Noise from Grayscale Digital Images by Traditional and Fuzzy Filters
Baydaa I. Khalil,
Image denoising and enhancement is an important field and it is used very much in image processing, where images are corrupted by many kinds of noise, therefore, methods and techniques must be used...
PILP-rings and fuzzy ideals
Raida D. Mahmood,
In this paper, we study rings whose principal right ideals are left pure. Also we shall introduce the concept of a fuzzy bi-ideal in a ring, and give some properties of such fuzzy ideals. We also...
Dynamic Programming Algorithms for Solving Single Machine Scheduling Problems with a Fixed Complexity Time
Kawa A. Al-Qazilchy,
We solvein this paper some machine scheduling problems with certain conditions; the solution had been made by using dynamic programming procedures with a fixed time for all the algorithms. Some of...
Discrimination Features by Wavelet Transformation
Faten A. Mustafa, Turkan A. Khalil, Almas A. Khalil,
Recently, techniques and applications in space data processing it's and study characteristics in different areas and applications such as remote sensing study of land use, land cover and geological...
Cryptanalysis Knapsack Cipher Using Artificial Immune System
Eman Th. Al-Obaidy,
In this work, the use of an artificial immune system (AIS ) in cryptanalysis is explored. This AIS uses the clonal selection principle for the cryptanalysis of knapsack cipher. Results showed that...
The n-Wiener Polynomials of the Cartesian Product of a Complete Graph with some Special Graphs
Ali Aziz Ali, Haveen G. Ahmed,
The n-Wiener polynomials of the Cartesian products of a complete graph Kt with another complete graph Kr, a star graph Sr, a complete bipartite graph Kr,s, a wheel Wr, and a path graph Pr are...
A Generalization of Von Neumann Regular Rings
Adil K. Jabbar,
In this paper, we introduce a new ring which is a generalization of Von Neumann regular rings and we call it a centrally regular ring. Several properties of this ring are proved and we have...
Flow Stability Analysis of the Shallow Water Equations Model
Ashraf S. Aboudi,
This paper is devoted to analyze the stability of shallow water of a system of equations that was exposed to disturbancing. This analysis is done by finding the eigenvalues of the system which...
Efficient Genetic Algorithms for Arabic Handwritten Characters Recognition
Laheeb Mohammad Ibrahim,
The main challenge in Arabic handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects in a short period of time high...