Volume 10 Issue 2

Published: 2025-06-25

Contents


Research Paper
Compress Digital Image based on Genetic Meta-Heuristic algorithm

Fawziya Mahmood Ramo, Yaser Noor Al Deen,

In this research a propose method has be used to compression Data of digital image based on one of Meta Heuristic Algorithm. Genetic Meta Heuristic has been applied to obtain effective data and...

Pages: 135-143
Chaotic Watermarking for Authentication

Melad Jader Saeed,

This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two...

Pages: 243-257
Representation of a Distributed Database System for the Medical Purposes Using Oracle

Basam A. Mustafa, Ahmed A. Al-Saman,

This research concerned with the designing and implementation of a distributed database system for the medical purposes. The system has been applied on dental clinic unit and statistics department...

Pages: 173-187
A Series of Saddle - Node Bifurcation and Chaotic Behavior of a Family of a Semi - Triangular Maps

Salma M. Faris, Ammar A.M. Jameel,

This paper studies the bifurcations in dynamics of a family of semi-triangular maps . We will prove that this family has a series of Saddle-node bifurcations and a period doubling bifurcation....

Pages: 63-77
Designing an Eelectronic Transmission System Using the Information and Communication Technology Infrastructure "A Proposed Model for the Intranet at the University of Mosul"

Raed A. Al-Dabbagh, Mustafa Z. Al-Dabbagh,

The aim of the current study is to employing ICT in a way that supports management by establishing an electronic transmission system characterized with some features different from the previous...

Pages: 61-80
Genetic Linear Averaging Algorithm for Zooming Digital Images

Baydaa Sulaiman Bahnam,

In this paper, the hypernation of linear averaging algorithm for zooming images is achieved with genetic algorithm. It's applied on a number of samples of images that lack the indistinction of the...

Pages: 203-218
A Modified Augmented Lagrange Multiplier Method for Non-Linear Programming

Abbas Y. Al-Bayati, Eman T. Hamed,

In this paper, we have investigated a new algorithm which employs an Augmented Lagrangian Method (ALM). It overcomes many of the difficulties associated with the Penalty function method. The new...

Pages: 13-25
Classification of Web Pages by Using Particle Swarm Optimization Algorithm

Ghayda A.A. Al-Talib, Muhammad Hamid Abdulraheem,

As the amount of information available on the internet grows so does the need for more effective data analysis methods. This paper utilizes the particle swarm optimization (PSO) algorithm in the...

Pages: 95-112
Stability Analysis for Inclined Channel by an Angle 30◦ with The Presence of Magnetic Field

Ahmmed Jumaa, Alaa Hammodat,

In this research, we study the stability of a system of partial differential equations which represents fluid flow in an inclined channel and under the influence of a magnetic field perpendicular...

Pages: 143-152
Solution of Nonlinear 2nd Order Multi-Point BVP By Semi-Analytic Technique

Luma N.M. Tawfiq, Mariam M. Hilal,

In this paper, we present new algorithm for the solution of the nonlinear second order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the...

Pages: 113-121
On Some Properties of Functions on Convex Galaxies

Tahir H. Ismail, Barah M. Sulaiman, Hind Y. Saleh,

In this paper, we define and study extensively a new type of external sets in , we call it "convex galaxies". We show that these convex external sets may be classified in some definite types. More...

Pages: 165-170
Classification of Zero Divisor Graphs of a Commutative Ring With Degree Equal 7 and 8

Husam Q. Mohammad, Nazar H. Shuker,

In 2005 J. T Wang investigated the zero divisor graphs of degrees 5 and 6. In this paper, we consider the zero divisor graphs of a commutative rings of degrees 7 and 8.

Pages: 123-127
On Completely YJ-injective Rings

Husam Q. Mohammad, Raida D. Mahammod,

A ring R is called completely right YJ-injective (briefly, right CYJ injective ) if every homomorphic image of R is right YJ-injective. In this paper, we study completely right YJ-injective rings...

Pages: 27-32
Stability Analysis of the Flow of Blood in the Branching and Stenoted Arteries

Rotaiyna J. Essa, Shaimaa M. Younis,

This research is devoted to the stability analysis of the system of equations that describes the flow of blood in the branching and stenoted arteries. This branch takes the form of the character Y,...

Pages: 233-242
Hiding Information using Replacement in Silent Mutation of DNA Sequences

Ahmed S. Nori, Sadoon H. Abdullah,

The present study included an application of new method of steganography using DNA sequence as a media for hiding. This method is considered a secret cover for the secret message (text, image),...

Pages: 113-134
Programming Mobile Applications

Nada N. Saleem, Mohammad Abdalraheem Hamdy,

Mobile and wireless devices become widespread devices in the past few years, These devices made substantial progress in the important field of wireless applications which used in all areas of human...

Pages: 189-202
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers

Asmaa Yaseen Hamoo, Sundus Abdulmuttalib Muhamed,

In order to make use of the web services, it has recently become inevitable to connect computers to the internet. This connection, however, make the computers prone to the challenges of intrusion...

Pages: 43-60
Modifying Explicit Finite Difference Method by Using Radial Basis Function Neural Network

Omar S. Kasim,

In this research, we use artificial neural networks, specifically radial basis function neural network (RBFNN) to improve the performance and work of the explicit finite differences method (EFDM),...

Pages: 171-186
Measurement of the Efficiency of Parallel Genetic Algorithm for Compress and Decompression of Fractal Imaging Using Multiple Computers

Shahla A. Abdul Qadir,

Efficient technologies have been recently used in Fractal Image Coding (FIC) to reduce the complexity of searching for matching between Range block and Domain block. The research aims at using the...

Pages: 219-232
Convergence Analysis of The Finite Difference Solution for Two Dimensions Coupled-Benjamin-Bona-Mahony System

Ekhlass S. Al-Rawi, Muhannad Shallal,

This paper is devoted to drive the matrix algebraic equation for the two-dimensional nonlinear coupled-BBM system which is obtained from using the implicit finite difference method. The convergence...

Pages: 129-141
Design and Implementation of Distributed Real-time Security System via Mobile Technology

Dhuha Basheer Abdullah, Wael W. Mahmood,

In this paper, a distributed real time security system for monitoring and remote control on building and protecting it from unauthorized entering is designed and implemented. This system is based...

Pages: 79-99
New Conjugacy Coefficient for Conjugate Gradient Method for Unconstrained Optimization

Hamsa TH. Chilmeran, Huda Y. Najm,

In this paper, we derived a new conjugacy coefficient of conjugate gradient method which is based on non-linear function using inexact line searches. This method satisfied sufficient descent...

Pages: 33-46
n-Hosoya polynomials for Pentagonal Chains

Ali Aziz Ali, Hadeel Abdullah Meshw,

The diameter, with respect to the n-distance of the graph which represents a straight chain consisting of m pentagonal rings, is obtained in this paper. The n-Hosoya polynomial of , for all m and...

Pages: 25-42
An Application of He's Variational Iteration Method for Solving Duffing - Van Der Pol Equation

Ann J. Al-Sawoor, Merna A. Samarchi,

In this paper, we apply He's variational iteration method (VIM) and the Adomian decomposition method (ADM) to approximate the solution of Duffing-Van Der Pol equation (DVP). In VIM, a correction...

Pages: 153-163
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data

Naglaa B. Ibrahim, Hana M. Usman,

With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as...

Pages: 145-158
Scansion Text Written in English language and Recognized Printed English Character using Bidirectional Associative Memory Network

Aseel W. Ali,

The fact that English language is a universal language, so it is necessary to propose a computerized ways to recognize the texts written in English language, which will simplifies the reading of...

Pages: 81-94
Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem

Ruqaya Z. Sha’ban,

The research tackled artificial intelligent methods to solve one of the optimization problems by using artificial ant by applying ant colony optimization algorithm and also tabu search algorithm to...

Pages: 101-112
Face Detection in a Video File Based on Matching Face Template

Maha A. Hasso, Shahad A. Hasso,

The research aim is apply algorithm for finding the number of regions to determine the largest number of faces of candidates in the video or detection, which appear in the video depending on the...

Pages: 159-172
The n-Hosoya Polynomials of the Composite of Some Special Graphs

Ahmed M. Ali,

It is not easy to find the n-Hosoya polynomial of the compound graphs constructed in the form G1G2 for any two disjoint connected graphs and .Therefore, in this paper, we obtain n-Hosoya polynomial...

Pages: 47-62
Study Conditions of Center of Gravity for Trivial Solution to Semi Linear Differantial Equation of Third Order in The One Critical Cases

Thair Younis Thanoon, Zena Talal Yaseen,

In this paper we study the conditions under which the zero solution iscenter of Gravity in the semi-liner case for certain third order differential equation of the form: We have: The...

Pages: 13-23