Volume 6 Issue 3

Published: 2025-06-25

Contents


Article
New low storage VM-algorithm for constrained optimization

Abbas Y. Al-Bayati, Hamsa Th. Chilmerane,

In this paper a new low-storage VM-algorithm for constrained optimization is investigated both theoretically and experimentally. The new algorithm is based on both the well-known Fletcher's low...

Pages: 11-19
Research Paper
Stability Analysis of Unified Chaotic System

Saad Fawzi AL-Azzawi,

The aim of this paper is to find the stability of unified chaotic system through studying different systems. The unified chaotic system is divided into three systems by depending on the values of ,...

Pages: 161-171
Evaluation of Electrons Energy Distribution Function by Fuzzy Logic

Nabhan A. Hamdon,

Evaluation of a maxwellian Electrons Energy Distribution Function (EEDF) in plasma glow discharge in air has been done. It includes the design of computerized system which depends on one of the...

Pages: 127-144
On GP- Ideals

Raida D. Mahmood, Shahla M. Khalil,

In this work we give some new properties of GP- ideals as well as the relation between GP- ideals, - regular and simple ring. Also we consider rings with every principal ideal are GP- ideals and...

Pages: 57-63
Image Compression Based on Artificial Intelligent Techniques

Shahbaa I. Khaleel, Baydaa I. Khaleel, Alaa I. khaleel

This research present four methods to compress digital images using clustering based on artificial intelligent techniques that include neural network, fuzzy logic and hybrid between them. To...

Pages: 75-109
On Idempotent Elements

Nazar H. Shuker, Alaa Hammodat,

In this paper we study idempotent elements, we give some new properties of idempotent elements and provide some exam we also study central idempotent elements and orthogonal idempotent elements and...

Pages: 49-56
The n-Wiener Polynomials of Straight Hexagonal Chains and Kt×Cr

Ali Aziz Ali, Haveen G. Ahmed,

The n-Wiener polynomials of straight hexagonal chains and the Cartesian product of a complete graph Kr and a cycle Cr are obtained in this paper. The n-diameter and the n-Wiener index of each such...

Pages: 129-139
New conjugacy condition with pair-conjugate gradient methods for unconstrained optimization

Abbas Y. Al-Bayati, Huda I. Ahmed,

Conjugate gradient methods are wildly used for unconstrained optimization especially when the dimension is large. In this paper we propose a new kind of nonlinear conjugate gradient methods which...

Pages: 21-35
Off-line Recognition of Unconstrained Handwritten Numerals Using Fuzzy Hough Transform

Mohammed Z. Khedher, Ghayda A.A. Al-Talib, Shayma M. Al mashhadany

A fuzzy system for handwritten numerals recognition using a fuzzy Hough transform technique is presented. The system is an off-line system since the data processed was written before the time of...

Pages: 211-226
On The Basis Number Of Semi-Strong Product Of With Some Special Graphs

Ghassan T. Marougi,

The basis number, b(G) ,of a graph G is defined to be the smallest positive integer k such that G has a k-fold basis for its cycle space. We investigate the basis number of semi-strong product of...

Pages: 173-181
Enhance Fingerprint Image by Using Genetic Algorithms

Ban Ahmed Mitras, Daliya Abdullah,

In this paper, an algorithm is proposed to enhance fingerprint image which includes in one of its steps a smoothing process in which the suggested genetic algorithms by Mitras and Anwar in 2007...

Pages: 57-73
Real Dynamics and Bifurcation of the Family

Salma M. Faris,

The purpose of this work is to study the dynamics of the family of nonlinear functions ={It is shown that the bifurcation in the dynamics of occurs at the critical parameter value

Pages: 81-91
An Algorithm for the Best Way Connection among Cell-Phone Towers Using Feedforward Neural Network

Kais I. Ibraheem, Thamir Abdul Hafed Jarjis, Yahya Q. Ibrahim

A new approach for mobile radio towers is presented in this paper. The use of feed-forward artificial neural network makes it possible to overcome some important disadvantages of previous random...

Pages: 197-209
Enhancing Cost and Security of Arabic SMS Messages over Mobile Phone Network

Abdullah A. Abdullah,

This paper investigates a novel algorithm for compressing and encrypting Arabic short text messages (SMS messages). Short text messages are used in cellular networks. Compression is required for...

Pages: 111-127
Stability Analysis for Steady State Solutions of Burger Equation

Saad Abdullah Manna, Badran Jassim Salem,

The Stability Analysis of Steady State Solution of Burger equation by using Fourier mode Stability analysis in two cases has been considered , the first one when the amplitude is constant and the...

Pages: 25-36
w-Wiener polynomials of Width Distance for Cartesian Product K2 with Cycle and Wheel

Ali Aziz Ali, Asma Salah Aziz,

The w-Wiener polynomials of the cartesian product of K2 with a cycle Ct and with a wheel Wt are obtained in this paper , in which w does not exceed the connectivity of the product graph . The...

Pages: 37-55
Stream Cipher Using Genetic Algorithm

Melad jader saeed,

The research tackles newly suggested method in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the...

Pages: 111-126
A New Binary Mathematical Programming Problem Model for Mobile Communication

Abdul-Rahim K. Alharithi, Dana A. Mahmood,

The aim of this study is to determine the number of base slatlons and capacity of each base station to satisfy the increased traffic demand and serving all traffic demand areas with a sufficient...

Pages: 37-47
Stability Conditions for Flow Rate of Liquid Between Two Vessels

Thair Y. Thanoon, Nagham N. Hana,

In this paper we obtain the conditions under which the trivial solution is stable for the following perturbed differential system : where _ constants. which described the flow rate of...

Pages: 141-150
Image compression using Modified Fuzzy Adaptive Resonance Theory

Ielaf O. abdl-majjed,

This research developed a software which can be used for image compression. This research proposes two methods: the first uses Joint Photographic Experts Group (JPEG), while the second uses...

Pages: 151-160
New Hybrid Quasi-Newton Algorithms for Large Scale Optimization

Abbas Y. Al-Bayati, Sawsan S. Ismail,

Two new hybrid algorithms have been suggested in this paper, the first one utilizes four formula of self-scaling update matrix was used. The matrix is selected according to Buckley method in each...

Pages: 11-24
Comparison between the Heun's and Haar Wavelet Methods for solution Differential-Algebraic Equations (DAEs)

Abdulghafor M. Al-Rozbayani, Ahmed F. Qasem,

In this paper, We solved the system of differential-algebraic equation (DAEs) of index one numerically with Heun's method and operational matrices of Haar wavelet method, When we compared the...

Pages: 183-196
Solving Multi-Objective Complementary Programming Problem (MOCPP) by using Optimal Average

Najmaddin A. Sulaiman, Abdul-Qader O. Hamadamin,

In this paper, we suggested an approach to solve Multi-Objective Complementary Programming Problem (MOCPP) by using optimal average (OAV). The computer application of algorithm also has been...

Pages: 65-79
Using Predictor-Corrector Methods for Numerical Solution of System of Non-linear Volterra Integral Equations of Second Kind

Borhan F. Jumaa, Abbas H. Taqi,

The aim of this paper is solving system of non-linear Volterra integral equations of the second kind (NSVIEK2) numerically using Predictor-Corrector methods (P-CM). Two multistep methods...

Pages: 93-109