Volume 10 Issue 2
Published: 2025-06-25
Contents
Research Paper
Compress Digital Image based on Genetic Meta-Heuristic algorithm
Fawziya Mahmood Ramo, Yaser Noor Al Deen,
In this research a propose method has be used to compression Data of digital image based on one of Meta Heuristic Algorithm. Genetic Meta Heuristic has been applied to obtain effective data and...
Chaotic Watermarking for Authentication
Melad Jader Saeed,
This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two...
Representation of a Distributed Database System for the Medical Purposes Using Oracle
Basam A. Mustafa, Ahmed A. Al-Saman,
This research concerned with the designing and implementation of a distributed database system for the medical purposes. The system has been applied on dental clinic unit and statistics department...
A Series of Saddle - Node Bifurcation and Chaotic Behavior of a Family of a Semi - Triangular Maps
Salma M. Faris, Ammar A.M. Jameel,
This paper studies the bifurcations in dynamics of a family of semi-triangular maps . We will prove that this family has a series of Saddle-node bifurcations and a period doubling bifurcation....
Designing an Eelectronic Transmission System Using the Information and Communication Technology Infrastructure "A Proposed Model for the Intranet at the University of Mosul"
Raed A. Al-Dabbagh, Mustafa Z. Al-Dabbagh,
The aim of the current study is to employing ICT in a way that supports management by establishing an electronic transmission system characterized with some features different from the previous...
Genetic Linear Averaging Algorithm for Zooming Digital Images
Baydaa Sulaiman Bahnam,
In this paper, the hypernation of linear averaging algorithm for zooming images is achieved with genetic algorithm. It's applied on a number of samples of images that lack the indistinction of the...
A Modified Augmented Lagrange Multiplier Method for Non-Linear Programming
Abbas Y. Al-Bayati, Eman T. Hamed,
In this paper, we have investigated a new algorithm which employs an Augmented Lagrangian Method (ALM). It overcomes many of the difficulties associated with the Penalty function method. The new...
Classification of Web Pages by Using Particle Swarm Optimization Algorithm
Ghayda A.A. Al-Talib, Muhammad Hamid Abdulraheem,
As the amount of information available on the internet grows so does the need for more effective data analysis methods. This paper utilizes the particle swarm optimization (PSO) algorithm in the...
Stability Analysis for Inclined Channel by an Angle 30◦ with The Presence of Magnetic Field
Ahmmed Jumaa, Alaa Hammodat,
In this research, we study the stability of a system of partial differential equations which represents fluid flow in an inclined channel and under the influence of a magnetic field perpendicular...
Solution of Nonlinear 2nd Order Multi-Point BVP By Semi-Analytic Technique
Luma N.M. Tawfiq, Mariam M. Hilal,
In this paper, we present new algorithm for the solution of the nonlinear second order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the...
On Some Properties of Functions on Convex Galaxies
Tahir H. Ismail, Barah M. Sulaiman, Hind Y. Saleh,
In this paper, we define and study extensively a new type of external sets in , we call it "convex galaxies". We show that these convex external sets may be classified in some definite types. More...
Classification of Zero Divisor Graphs of a Commutative Ring With Degree Equal 7 and 8
Husam Q. Mohammad, Nazar H. Shuker,
In 2005 J. T Wang investigated the zero divisor graphs of degrees 5 and 6. In this paper, we consider the zero divisor graphs of a commutative rings of degrees 7 and 8.
On Completely YJ-injective Rings
Husam Q. Mohammad, Raida D. Mahammod,
A ring R is called completely right YJ-injective (briefly, right CYJ injective ) if every homomorphic image of R is right YJ-injective. In this paper, we study completely right YJ-injective rings...
Stability Analysis of the Flow of Blood in the Branching and Stenoted Arteries
Rotaiyna J. Essa, Shaimaa M. Younis,
This research is devoted to the stability analysis of the system of equations that describes the flow of blood in the branching and stenoted arteries. This branch takes the form of the character Y,...
Hiding Information using Replacement in Silent Mutation of DNA Sequences
Ahmed S. Nori, Sadoon H. Abdullah,
The present study included an application of new method of steganography using DNA sequence as a media for hiding. This method is considered a secret cover for the secret message (text, image),...
Programming Mobile Applications
Nada N. Saleem, Mohammad Abdalraheem Hamdy,
Mobile and wireless devices become widespread devices in the past few years, These devices made substantial progress in the important field of wireless applications which used in all areas of human...
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers
Asmaa Yaseen Hamoo, Sundus Abdulmuttalib Muhamed,
In order to make use of the web services, it has recently become inevitable to connect computers to the internet. This connection, however, make the computers prone to the challenges of intrusion...
Modifying Explicit Finite Difference Method by Using Radial Basis Function Neural Network
Omar S. Kasim,
In this research, we use artificial neural networks, specifically radial basis function neural network (RBFNN) to improve the performance and work of the explicit finite differences method (EFDM),...
Measurement of the Efficiency of Parallel Genetic Algorithm for Compress and Decompression of Fractal Imaging Using Multiple Computers
Shahla A. Abdul Qadir,
Efficient technologies have been recently used in Fractal Image Coding (FIC) to reduce the complexity of searching for matching between Range block and Domain block. The research aims at using the...
Convergence Analysis of The Finite Difference Solution for Two Dimensions Coupled-Benjamin-Bona-Mahony System
Ekhlass S. Al-Rawi, Muhannad Shallal,
This paper is devoted to drive the matrix algebraic equation for the two-dimensional nonlinear coupled-BBM system which is obtained from using the implicit finite difference method. The convergence...
Design and Implementation of Distributed Real-time Security System via Mobile Technology
Dhuha Basheer Abdullah, Wael W. Mahmood,
In this paper, a distributed real time security system for monitoring and remote control on building and protecting it from unauthorized entering is designed and implemented. This system is based...
New Conjugacy Coefficient for Conjugate Gradient Method for Unconstrained Optimization
Hamsa TH. Chilmeran, Huda Y. Najm,
In this paper, we derived a new conjugacy coefficient of conjugate gradient method which is based on non-linear function using inexact line searches. This method satisfied sufficient descent...
n-Hosoya polynomials for Pentagonal Chains
Ali Aziz Ali, Hadeel Abdullah Meshw,
The diameter, with respect to the n-distance of the graph which represents a straight chain consisting of m pentagonal rings, is obtained in this paper. The n-Hosoya polynomial of , for all m and...
An Application of He's Variational Iteration Method for Solving Duffing - Van Der Pol Equation
Ann J. Al-Sawoor, Merna A. Samarchi,
In this paper, we apply He's variational iteration method (VIM) and the Adomian decomposition method (ADM) to approximate the solution of Duffing-Van Der Pol equation (DVP). In VIM, a correction...
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Naglaa B. Ibrahim, Hana M. Usman,
With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as...
Scansion Text Written in English language and Recognized Printed English Character using Bidirectional Associative Memory Network
Aseel W. Ali,
The fact that English language is a universal language, so it is necessary to propose a computerized ways to recognize the texts written in English language, which will simplifies the reading of...
Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem
Ruqaya Z. Sha’ban,
The research tackled artificial intelligent methods to solve one of the optimization problems by using artificial ant by applying ant colony optimization algorithm and also tabu search algorithm to...
Face Detection in a Video File Based on Matching Face Template
Maha A. Hasso, Shahad A. Hasso,
The research aim is apply algorithm for finding the number of regions to determine the largest number of faces of candidates in the video or detection, which appear in the video depending on the...
The n-Hosoya Polynomials of the Composite of Some Special Graphs
Ahmed M. Ali,
It is not easy to find the n-Hosoya polynomial of the compound graphs constructed in the form G1G2 for any two disjoint connected graphs and .Therefore, in this paper, we obtain n-Hosoya polynomial...
Study Conditions of Center of Gravity for Trivial Solution to Semi Linear Differantial Equation of Third Order in The One Critical Cases
Thair Younis Thanoon, Zena Talal Yaseen,
In this paper we study the conditions under which the zero solution iscenter of Gravity in the semi-liner case for certain third order differential equation of the form: We have: The...