Volume 9 Issue 1
Published: 2025-06-25
Contents
Article
Existence and Uniqueness of Solutions for Certain Nonlinear Mixed Type Integral and Integro-Differential Equations
Akram H. Mahmood, Lamyaa H . Sadoon,
The aim of this paper is to study the existence, uniqueness and other properties of solutions of certain Volterra-Fredholm integral and integro differential equations. The tools employed in the...
On Generalized Simple Singular AP-Injective Rings
Raida D. Mahmood, Husam Q. Mohammad,
A ring R is said to be generalized right simple singular AP-injective, if for any maximal essential right ideal M of R and for any bM, bR/bM is AP-injective. We shall study the characterization and...
Research Paper
The Basis Number of Quadruple Join of Graphs
Raghad A. Mustafa, Ghassan T. Marougi,
The basis number, b(G) ,of a graph G is defined to be the smallest positive integer k such that G has a k-fold basis for its cycle space. We investigate an upper bound for .It is proved that, if...
Numerical solution and stability analysis of the Sine-Gordon system in two dimensions
Saad A. Manna, Haneen T. Jassim,
This paper deals with the numerical solution for Sine-Gordon system in two dimensions using two finite difference methods the (ADE) and (ADI) methods .A comparison between the two methods has been...
A New Type of ξ-Open Sets Based on Operations
Haji M. Hasan
The aim of this paper is to introduce a new type of -open sets in topological spaces which is called -open sets and we study some of their basic properties and characteristics.
A New Method for Iris Segmentation and Feature Extraction in Spatial Domain
Dujan B. Taha, Shamil Q. Ibraheem,
In this paper, a new proposed method is developed, this method contains two algorithms, one for human iris recognition, the other is for extracting the features of the recognized iris. Many studies...
Development AES Algorithm to Encryption Images and Sounds Files
Mohammed C.Y. Al-Zubaidy,
In this research, the Advanced Encryption Standard (AES) algorithm was developed, the AES is used for encryption and decryption the images and sounds files by expanding the block size of data to...
New Study of Stability for New Lorenz-like System
Alaa Hammodat, Ahmmed Jumaa,
In this paper, we studied differential system like of three dimensional Lorenz system. Nonlinear characteristic and basic dynamic properties of three dimensional autonomous system are studied by...
On Simple GP – Injective Modules
Mohammed Th. Youns, Najlaa T. Jassim,
In this paper, we study rings whose simple right R-module are GP-injective. We prove that ring whose simple right R-module is GP-injective it will be right -weakly regular ring. Also, proved that...
Controlling and Protecting Windows Applications by Analyzing and Manipulating PE File Format
Rawaa P. Qasha, Zaid A. Monther,
PE (Portable Executable) is the native file format of Windows32. Analyzing and manipulating the PE file gives valuable insights into the structure and work of Windows. This research includes...
A Study on the Conditions of Oscillation of Solutions of Second Order Impulsive Delay Differential Equations
Muayyad M. Khalil,
Oscillation conditions of second order impulsive delay differential equations with impulses are investigated, some sufficient conditions for all solutions to be oscillatory are obtained. Also, two...
Brain Tumor Detection Using Snake Algorithm and Fuzzy C-Mean
Ramadan M. Ramo,
In this research, two methods have been suggested for the detection of the brain tumor . (which is defined as the abnormal growth of cells), The first method is used the snake algorithm and the...
Development a Special Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems
Basim A. Hassan,
This paper develops a special conjugate gradient algorithm for solving unconstrained minimized problems. This development can be regarded as some kind of convex combination of the MPR and MLS...
Hybrid hiding in multimedia files
Farah Tareq Mohammed,
The principle of hybrid information hiding represented by process of information hiding message (multimedia files) embedded inside another message which is depended on hiding a certain media in...
A Full List of Projectively Distinct K-Arcs in Finite Projetive Space Pg(2,8)
Ali Ahmed A. Abdulla, Abdulkhalik L. Yasin,
A k-arc in a plane PG(2,q) is a set of k point such that every line in the plane intersect it in at most two points and there is a line intersect it in exactly two points. A k-arc is complete if...
Automatic Test Cases Generation Using an Advanced GEP Method
Najla Akram Al-Saati, Roua Basil,
This research aims to provide a practical work on the principle of the Extreme Programming (XP) which is a type of the Agile Software Development Methods which is used in the generation of...
Image Coding Using EZT Based on Contourlet Transformation
Khalil I. Alsaif, Teba M. Ghaze,
Due to the fact that most of the application on EZT algorithm were applied on wavelet transformation. In the last ten years, the contourlet transformation shows that its efficiency is higher than...
The Detour Polynomials of Ladder Graphs
Ali Aziz Ali, Gashaw A. Muhammed-Saleh,
The detour distance between two distinct vertices and of a connected graph is the length of a longest path in. The detour index of is defined by, and the detour polynomial of is . The detour...
Steganalysis Using KL Transform and Radial Basis Neural Network
Safwan Hasoon, Farhad M. Khalifa
The essential problem in the security field is how to detect information hiding. This paper proposes a new steganalysis scheme based on artificial neural network as a classifier to detect...
Authentication of data hiding using co-occurrence matrix
Melad jader saeed, Ghada thanoon,
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying...
Using The Value of GPS To Determined The Position Of The Mobile User in Mosul University
Ghayda A.A. Al-Talib, Hiba Muneer Yahya,
The Mobile is a circuit that receives and sends signals through earth stations and satellites so the objective of this research is to build a system that retrieves information about the location of...
Explicit- Implicit Runge-Kutta Methods to Solve the System of Nonlinear PPDEs in Two Dimensions
Abbas Y. Al-Bayati, Saad Manaa, Abdulghafor M. Al-Rozbayani,
In this paper, we will find the numerical solution of Gray-Scott model in two dimensions space, this method is a system of non-linear parabolic partial differential equations. Then transforming the...
Development Of Traditional Algorithms and Make a Hybrid Algorithm to Denoising The Color Images
Hanan Hamid Ali,
The development in life has made the need very important for using images in many scientific fields like space, engineering and medicine. Due to the fact that such images are affected by various...
Pθ-Topological Groups in Nonstandard Analysis
Tahir H. Ismail, Ibrahim O. Hamad, Sami A. Hussein,
The aim of this paper is to introduce and study a new class of topological groups called P-topological group. By using some nonstandard techniques, we investigated some properties of P-monads in...
Employing Information technology in Designing a Network Based Human Resources Information System
Raed Abdul Qadir Hamid, Inaam Abdul Jabbar Sultan,
The research deals with the importance of ICT in the design of HRIS based on the network. Its importance lies in the practical side, through the adoption of the Technical Institute / Nineveh...
A Proposed Methodology for Software Engineering of Agent Systems
Asmaa Yaseen Hammo, Maher Talal Alasaady,
In recent years, computer systems that make use of software agents are increased, due to the increased size and complexity of these systems, as well as, because the benefits provided by agents to...
w-Hosoya polynomials for Pentagonal Chains
Ali Aziz Ali, Shwan Salou Abdul Ilyas,
Properties of the width distance in graphs are given in this paper . The w-Hosoya Polynomials of straight pentagonal chains and of alternate pentagonal chains are obtained with Wiener indices of...
Compression Image by Using Iterated Function Systems
Basil Y. Al-khayat, Mahasin Thabit Younis,
This research was in the compression digital images using the iterative function and applied to grayscale images, color images and then re-pressed image decoding. Matlab language is used for...
De-speckling 2D-Discrete Wavelet Transform with Hard Threshold Stage
Dhafer F. Hasan, Maha A. Abdul-Jabar, Zahraa T. Abed Al-Mokhtar,
In this work, a new method is implemented for removing noise from gray scale image that depends on two-dimensional discrete wavelet transform and Threshold stage (hard threshold). This paper...
Design Genetic Algorithm To Find The Optimal Critical Path Network Project (GAOCPN)
Samaa Tlayea Azeez, Niam Al-Thanoon, Lamyaa Jasim Mohammed,
The present study deals with using up-to-date intelligenttechniques. We try to utilize the genetic algorithm efficiently and integrate it with the problem of study by designing and applying a...