Volume 8 Issue 2
Published: 2025-06-25
Contents
Article
Information Hiding Based on Chan-Vese Algorithm
Samia Sh. Lazar, Nadia M. Mohammed
The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and...
Research Paper
Design a Software Engineering CASE Tool (ERToOracle10g) to transform a graphical Entity Relationship model (ER model) to Oracle10g
Nada N. Saleem, Saad Ahmed Th.,
CASE Tools play a significant role in the field of software engineering development processes where they are utilized in system modeling and analysis, in system design and in generating automatic...
Design Educational Bag in Basics of Image Processing
Ghada Mohammad Tahir Qasim,
The didactic bags which are programs designed to replace the teacher in a certain scientific field, are the modernist didactic means which proved great activity in the didactic process and due to...
A New Symmetric Rank One Algorithm for Unconstrained Optimization
Abbas Y. Al-Bayati, Salah G. Shareef,
In this paper, a new symmetric rank one for unconstrained optimization problems is presented. This new algorithm is used to solve symmetric and positive definite matrix. The new method is tested...
Hyper Secure Algorithm for Text
Melad jader saeed,
Classical encryption methods depend on two basic encryption method, namely MONO ALPHABET and POLY ALPHABET. In this research, we developed a hybrid encryption algorithm to overcome the weaknesses...
Monotonicity of Some Functions Involving The Beta Function
Hanadi D. Saleem,
In this short paper the monotonicity of functions involving the Beta function is considered to be study by using a similar method given in [2] and [4].
Unsteady Flow to Viscous Thin Films on a Vertical Surface
Khidr M.S. Khidr, Hanin T. Jasim, Hikmat Mustafa,
In this paper we have investigated the unsteady flow to thin films of an incompressible liquids with no inertia force, continuity equation and Nervier-Stokes equations are used to obtain the...
Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform
Shaimaa Sh. Mohammad,
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has...
Building an Intelligent System to Distinguish Russian Printed Letters using Artificial Neural Networks
Jamal S. Majeed, Sura R. Sherif, Osama Y. Mohamed,
In this research, an intelligent computer system is designed for recognizing printed Russian letters by extracting features of the letter by finding the Eigen values which then used for training...
Segment the Medical Images based on Contourlet Transformations
Khalil I. Al-Saif, Karam M. Abdullah,
In this paper, we have studied the Normalized Cut algorithm to segment the medical images that was widely used in the last decade. And we based on Image in contourlet domain that supports rich...
On n - Regular Rings
Raida D. Mahmood, Mohammed Th. Youns,
As a generalization of regular rings, that is a ring is called n-regular if for all . In this paper, we first give various properties of n-regular rings. Also, we study the relation between such...
Using Δ - Discriminate Method to Determine the Stability and Bifurcation of Chen Chaotic System
Saad Fawzi AL-Azzawi, Karam A. Abed,
The aim of this paper to found that the stability and bifurcation of Chen System by using a new method which called - discriminate method as will as we found the stability at the second critical...
Information Hiding Techniques Using Network Protocols
Manar Younis Kashmola, Ameera Bibo Sallo,
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol...
Hosoya Polynomials of The Width Distance of Some Cog-Special Graphs
Ahmed M. Ali, Tahir H. Ismail,
In this paper, we give some definitions and properties of the width distance and find the Hosoya polynomials, Wiener indices, and the average distances of some special cog-graphs with respect to...
Stability Analysis in Thin Liquid Film (Immobile Soap Film)
Rotina Jasim Al-Etewi, Zena Talal Al-Nuamy,
This research is dedicated for analyzing the stability of a system of flow equations for soap film that has opposed for disturbance, and this analysis was done by using Galerkin method which enable...
Intrusion Detection System Based on Neural Networks Using Bipolar Input with Bipolar Sigmoid Activation Function
Adel S. Issa, Adnan M. Abdulazeez,
Vulnerabilities in common security components such as firewalls are inevitable. Intrusion Detection Systems (IDS) are used as another wall to protect computer systems and to identify corresponding...
New Variable Metric Algorithm by The Mean of 2nd Order Quasi-Newton Condition
Abbas Y. Al-Bayati, Runak M. Abdullah,
In this paper a new class of Quasi-Newton update for solving unconstrained nonlinear optimization problem is proposed. In this work we suggested a new formula for the variable metric update with a...
Some Algebraic and Analytical Properties of Special Matrices
Laith K. Shaakir, Akram S. Mohamed, Nazar K. Hussein,
In this work we present a subset of ( is the set of all matrices ) which we called the set of special matrices and denoted it by . We give some important properties of .
P-Stability of Linear Multistep Methods for Delay Retarded Differential Equations with Several Delays
Abbas Y. Al-Bayati, Ann J. Al-Sawoor, Reyadh S. Naoum,
This paper modifies the numerical solution of initial value problems of the Delay Differential Equations (DDEs) by making it deals with Retarded Differential Equations (RDEs) with several delays...
Numerical Stability of Brusselator System
Saad A. Manaa, Rostam K. Saeed, Fadhil H. Easif,
The numerical stability analysis of Brusselator system has been done in one and two dimensional space. For one dimension we studied the numerical stability for explicit and implicit (Crank-...
An Investigation for Steganalysis in Color Images
Samah F. Aziz, Ahmed S. Nori,
With science developing and techniques used in Information hiding, there are another techniques wall together for Steganalysis. Steganography is considered as the new and the complementary system...
On the Basis Number of Some Special Graphs for Mycielski’s Graph
Ghassan T. Marougi, Raghad A. Mustafa,
The basis number b(G) ,of a graph G is defined to be the least positive integer k such that G has a k-fold basis for its cycle space. In this research paper,we have studied the basis number of some...
Design and Build a Database Management System for Computer Science Department Students
Ryan Youssef Yaacoub, Muhammad Hashem Sultan,
Student's system has been analyzed and A database was designed according to their registration, study and lectures attending , with full documentation to their degrees, the information of...