Volume 9 Issue 1

Published: 2025-06-25

Contents


Article
Existence and Uniqueness of Solutions for Certain Nonlinear Mixed Type Integral and Integro-Differential Equations

Akram H. Mahmood, Lamyaa H . Sadoon,

The aim of this paper is to study the existence, uniqueness and other properties of solutions of certain Volterra-Fredholm integral and integro differential equations. The tools employed in the...

Pages: 163-173
On Generalized Simple Singular AP-Injective Rings

Raida D. Mahmood, Husam Q. Mohammad,

A ring R is said to be generalized right simple singular AP-injective, if for any maximal essential right ideal M of R and for any bM, bR/bM is AP-injective. We shall study the characterization and...

Pages: 175-180
Research Paper
The Basis Number of Quadruple Join of Graphs

Raghad A. Mustafa, Ghassan T. Marougi,

The basis number, b(G) ,of a graph G is defined to be the smallest positive integer k such that G has a k-fold basis for its cycle space. We investigate an upper bound for .It is proved that, if...

Pages: 27-34
Numerical solution and stability analysis of the Sine-Gordon system in two dimensions

Saad A. Manna, Haneen T. Jassim,

This paper deals with the numerical solution for Sine-Gordon system in two dimensions using two finite difference methods the (ADE) and (ADI) methods .A comparison between the two methods has been...

Pages: 13-25
A New Type of ξ-Open Sets Based on Operations

Haji M. Hasan

The aim of this paper is to introduce a new type of -open sets in topological spaces which is called -open sets and we study some of their basic properties and characteristics.

Pages: 181-189
A New Method for Iris Segmentation and Feature Extraction in Spatial Domain

Dujan B. Taha, Shamil Q. Ibraheem,

In this paper, a new proposed method is developed, this method contains two algorithms, one for human iris recognition, the other is for extracting the features of the recognized iris. Many studies...

Pages: 35-46
Development AES Algorithm to Encryption Images and Sounds Files

Mohammed C.Y. Al-Zubaidy,

In this research, the Advanced Encryption Standard (AES) algorithm was developed, the AES is used for encryption and decryption the images and sounds files by expanding the block size of data to...

Pages: 113-127
New Study of Stability for New Lorenz-like System

Alaa Hammodat, Ahmmed Jumaa,

In this paper, we studied differential system like of three dimensional Lorenz system. Nonlinear characteristic and basic dynamic properties of three dimensional autonomous system are studied by...

Pages: 155-161
On Simple GP – Injective Modules

Mohammed Th. Youns, Najlaa T. Jassim,

In this paper, we study rings whose simple right R-module are GP-injective. We prove that ring whose simple right R-module is GP-injective it will be right -weakly regular ring. Also, proved that...

Pages: 147-154
Controlling and Protecting Windows Applications by Analyzing and Manipulating PE File Format

Rawaa P. Qasha, Zaid A. Monther,

PE (Portable Executable) is the native file format of Windows32. Analyzing and manipulating the PE file gives valuable insights into the structure and work of Windows. This research includes...

Pages: 23-33
A Study on the Conditions of Oscillation of Solutions of Second Order Impulsive Delay Differential Equations

Muayyad M. Khalil,

Oscillation conditions of second order impulsive delay differential equations with impulses are investigated, some sufficient conditions for all solutions to be oscillatory are obtained. Also, two...

Pages: 129-137
Brain Tumor Detection Using Snake Algorithm and Fuzzy C-Mean

Ramadan M. Ramo,

In this research, two methods have been suggested for the detection of the brain tumor . (which is defined as the abnormal growth of cells), The first method is used the snake algorithm and the...

Pages: 85-100
Development a Special Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems

Basim A. Hassan,

This paper develops a special conjugate gradient algorithm for solving unconstrained minimized problems. This development can be regarded as some kind of convex combination of the MPR and MLS...

Pages: 73-84
Hybrid hiding in multimedia files

Farah Tareq Mohammed,

The principle of hybrid information hiding represented by process of information hiding message (multimedia files) embedded inside another message which is depended on hiding a certain media in...

Pages: 175-185
A Full List of Projectively Distinct K-Arcs in Finite Projetive Space Pg(2,8)

Ali Ahmed A. Abdulla, Abdulkhalik L. Yasin,

A k-arc in a plane PG(2,q) is a set of k point such that every line in the plane intersect it in at most two points and there is a line intersect it in exactly two points. A k-arc is complete if...

Pages: 147-158
Automatic Test Cases Generation Using an Advanced GEP Method

Najla Akram Al-Saati, Roua Basil,

This research aims to provide a practical work on the principle of the Extreme Programming (XP) which is a type of the Agile Software Development Methods which is used in the generation of...

Pages: 49-65
Image Coding Using EZT Based on Contourlet Transformation

Khalil I. Alsaif, Teba M. Ghaze,

Due to the fact that most of the application on EZT algorithm were applied on wavelet transformation. In the last ten years, the contourlet transformation shows that its efficiency is higher than...

Pages: 59-72
The Detour Polynomials of Ladder Graphs

Ali Aziz Ali, Gashaw A. Muhammed-Saleh,

The detour distance between two distinct vertices and of a connected graph is the length of a longest path in. The detour index of is defined by, and the detour polynomial of is . The detour...

Pages: 139-146
Steganalysis Using KL Transform and Radial Basis Neural Network

Safwan Hasoon, Farhad M. Khalifa

The essential problem in the security field is how to detect information hiding. This paper proposes a new steganalysis scheme based on artificial neural network as a classifier to detect...

Pages: 47-58
Authentication of data hiding using co-occurrence matrix

Melad jader saeed, Ghada thanoon,

This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying...

Pages: 67-78
Using The Value of GPS To Determined The Position Of The Mobile User in Mosul University

Ghayda A.A. Al-Talib, Hiba Muneer Yahya,

The Mobile is a circuit that receives and sends signals through earth stations and satellites so the objective of this research is to build a system that retrieves information about the location of...

Pages: 135-146
Explicit- Implicit Runge-Kutta Methods to Solve the System of Nonlinear PPDEs in Two Dimensions

Abbas Y. Al-Bayati, Saad Manaa, Abdulghafor M. Al-Rozbayani,

In this paper, we will find the numerical solution of Gray-Scott model in two dimensions space, this method is a system of non-linear parabolic partial differential equations. Then transforming the...

Pages: 13-21
Development Of Traditional Algorithms and Make a Hybrid Algorithm to Denoising The Color Images

Hanan Hamid Ali,

The development in life has made the need very important for using images in many scientific fields like space, engineering and medicine. Due to the fact that such images are affected by various...

Pages: 35-47
Pθ-Topological Groups in Nonstandard Analysis

Tahir H. Ismail, Ibrahim O. Hamad, Sami A. Hussein,

The aim of this paper is to introduce and study a new class of topological groups called P-topological group. By using some nonstandard techniques, we investigated some properties of P-monads in...

Pages: 191-199
Employing Information technology in Designing a Network Based Human Resources Information System

Raed Abdul Qadir Hamid, Inaam Abdul Jabbar Sultan,

The research deals with the importance of ICT in the design of HRIS based on the network. Its importance lies in the practical side, through the adoption of the Technical Institute / Nineveh...

Pages: 159-174
A Proposed Methodology for Software Engineering of Agent Systems

Asmaa Yaseen Hammo, Maher Talal Alasaady,

In recent years, computer systems that make use of software agents are increased, due to the increased size and complexity of these systems, as well as, because the benefits provided by agents to...

Pages: 93-115
w-Hosoya polynomials for Pentagonal Chains

Ali Aziz Ali, Shwan Salou Abdul Ilyas,

Properties of the width distance in graphs are given in this paper . The w-Hosoya Polynomials of straight pentagonal chains and of alternate pentagonal chains are obtained with Wiener indices of...

Pages: 79-91
Compression Image by Using Iterated Function Systems

Basil Y. Al-khayat, Mahasin Thabit Younis,

This research was in the compression digital images using the iterative function and applied to grayscale images, color images and then re-pressed image decoding. Matlab language is used for...

Pages: 117-133
De-speckling 2D-Discrete Wavelet Transform with Hard Threshold Stage

Dhafer F. Hasan, Maha A. Abdul-Jabar, Zahraa T. Abed Al-Mokhtar,

In this work, a new method is implemented for removing noise from gray scale image that depends on two-dimensional discrete wavelet transform and Threshold stage (hard threshold). This paper...

Pages: 101-112
Design Genetic Algorithm To Find The Optimal Critical Path Network Project (GAOCPN)

Samaa Tlayea Azeez, Niam Al-Thanoon, Lamyaa Jasim Mohammed,

The present study deals with using up-to-date intelligenttechniques. We try to utilize the genetic algorithm efficiently and integrate it with the problem of study by designing and applying a...

Pages: 187-210