Volume 10 Issue 3

Published: 2025-06-25

Contents


Research Paper
Encrypt and Hide Data in True Color Image Classes

Maha A. Hasso, Shahad A. Hasso, Ban Ghanem Maayouf,

In a world that has evolved in which the information and means of transmission within the network of the whole world not to be a convenient way to keep that information to have some privacy or...

Pages: 75-89
Application of Some Traditional Denoiseing Algorithms to Zoom-Out the Color Images

Hanan Hamid Ali,

In this paper many algorithmswereapplied to" zoom out" the images, like the traditional algorithm (Linear Averaging) algorithm, then this algorithm was developed to a proposed algorithm (Block...

Pages: 37-46
The Detour Polynomials of the Corona of Graphs

Ali Aziz Ali, Gashaw A. Muhammed-Saleh,

A new graph distance based polynomial, called detour polynomial, is introduced. The detour polynomial and the detour index of the corona of two connected disjoint graphs and are obtained in this...

Pages: 55-62
On Generalized m-flat Modules

Zubayda M. Ibraheem, Maha F. Khalaf,

Let I be a right (left) ideal of a ring R. Then R/I is a right (left) generalized m flat modules (GmF module) if and only if for each , there exist and a fixed positive integer m such that . We...

Pages: 29-35
Study of Dynamical Properties and Effective of a State u for Hyperchaotic Pan Systems

Saad Fawzi AL-Azzawi,

In this paper, we propose a new four-dimensional continuous autonomous hyperchaotic system which is built by adding a nonlinear controller to a three- dimensional chaotic Pan system. The new system...

Pages: 89-99
Stability Study of the Orbits of Satellites around the Earth

Thair Y. Thanoon, Marwa Khaled fathy

In this research, we have studied of the motion of satellite orbits and rotation around the earth and that are subject to the laws of kepler and relationships associated with this motion, such as...

Pages: 143-156
Two Modified QN-Algorithms for Solving Unconstrained Optimization Problems

Abbas Y. Al-Bayati, Basim A. Hassan,

This paper presents two modified Quasi-Newton algorithms which are designed for solving nonlinear unconstrained optimization problems. These algorithms are based on different techniques namely:...

Pages: 21-28
Evaluation of Some Properties of Distributed Databases using Oracle

Alaa Faisal Saeed Al-Mukhtar,

In this study, query processing efficiency of the distributed database in the relational database Oracle9i was examined and compared. Our test data is based on a (Customer Type Definition), which...

Pages: 131-142
On Simple Singular N-Flat Modules

Raida D. Mahmood, Dina A. Hadid,

Let I be a right ideal of a ring R , then R/I is right N-flat module if and only if for each , there exists and a positive integer n such that and .In this paper, we first introduce and...

Pages: 13-20
Steganography based on Vector Quantization Technique

Ahmed S. Nori, Ansam Osamah,

The present research was aimed to implement a new Steganographic algorithm for Images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure cover for data to...

Pages: 13-27
Hosoya Polynomials of Generalized Vertex Identified and Edge Introducing Graphs

Ahmed M. Ali, Noor M. Dahash,

The vertex identified and edge introducing graphs of two disjoint connected graphs are extended to n, , disjoint connected graphs. Hosoya polynomials and Wiener indices of such composite graphs are...

Pages: 77-88
Classification of Software Engineering Documents Based on Artificial Immune Systems

Nada N. Saleem, Rasha Gh. Saeed,

Care about automated documents classification has increased since the appearance of the digital documents and the wide diffusion of Internet. In the 1990's, the computer performance has greatly...

Pages: 91-112
Fourier Stability Analysis of Two Finite Element Schemes for Reaction-Diffusion System with Fast Reversible Reaction

Ann Jalal, Mohammed O. Al-Amr,

In this paper, the stability analysis is performed on two Galerkin finite element schemes for solving reaction-diffusion system with fast reversible reaction. Fourier (Von Neumann) method is...

Pages: 117-128
New Three –Term CG-Method for Unconstrained Optimization

Ban A. Mitras, Nada F. Hassan,

In this paper, we proposed a new three-term nonlinear Conjugate Gradient (CG) method for solving unconstrained optimization problems. The new three-term method generates decent direction with an...

Pages: 29-35
Neural Network Using for Extracting Hidden Information in Images

safwan hasoon, Farhad M. Khalifa

Steganography technique widely spread and varied. With the widening in using steganography, its misuse alarmists arisen. Thus steganalysis comes into sight to deter unwanted secret communications....

Pages: 113-130
Digital Image Compression using Karhunen-Loève Transform

Ghada Thanoon Younes,

In this research present the digital image compression using by Karhunen-Love Transform (KLT), by convert a color digital image to a gray square digital image, then select the no. of eigen values...

Pages: 47-59
Numerical Solution for Non-linear Boussinesq System Using the Haar Wavelet Method

Ekhlass S. Al-Rawi, Ahmed F. Qasim,

In this paper, an operational matrix of integrations based on the Haar wavelet method is applied for finding the numerical solution of non-linear third-order boussinesq system and the numerical...

Pages: 101-115
Arabic Handwritten Signature Identification

Alaa Y. Taqa, Hanaa F. Mahmood,

This paper proposes a new intelligent off-line Arabic handwritten signature identification and verification system based on texture analysis. The system uses the texture as feature and back...

Pages: 37-54
Analysis of Requirements Phase as a Step for Software Engineering Automation

Abdul Sattar M. Khidhir, Noor L. Shihab,

Requirements engineering is the first phase of the software engineering process. This phase is the basis of other phases, so it is a very critical phase. Incomplete, ambiguous and misunderstanding...

Pages: 63-75
Chaotic Image Steganography using DCT and DWT

Nadia M. Mohammed,

The researcherswas interestin the issue of security from long time ago even arrived tothe current age(the digital age), andbecause of the importance of thistopicand thechallengesin it, sothis...

Pages: 61-73