Volume 9 Issue 2

Published: 2025-06-25

Contents


Research Paper
Alternating Direction Implicit Method for Solving Parabolic Partial Differential Equations in Three Dimensions

Abdulghafor M. Al-Rozbayani, Mahmood H. Yahya,

In this paper, the parabolic partial differential equations in three-dimensions are solved by two types of finite differences, such as, Alternating Direction Explicit (ADE) method and Alternating...

Pages: 79-97
Detection of network anomaly based on hybrid intelligence techniques

Shahbaa I. Khaleel, Karam mohammed mahdi saleh,

Artificial Intelligence could make the use of Intrusion Detection Systems a lot easier than it is today. As always, the hardest thing with learning Artificial Intelligence systems is to make them...

Pages: 81-98
Stability Study of Double and Spherical Pendulum

Thair Y. Thanoon, Noor Husain Abdullah,

This paper devoted to study the stability of periodic motion for physical application which is leads to differential equations of second order )Double and Spherical Pendulum( respectively by using...

Pages: 13-26
Design and Implementation of Probabilistic Assignment Management System for a Library Database Using Object Oriented Programming

Jamal M. Hameed,

Computerized information system has recently become widely available. Indeed, it has become an important instrument that can be applied in different aspects of life. One of the important...

Pages: 99-108
Construct a Tool for Aspect-Oriented Analysis and Design Based on Theme Approach

Nada N. Saleem, Mohammad H. Abdulwahab,

In this research, a (RADC-AO) tool was constructed and implemented for the requirements analysis, design and stub-code generation according to aspect-oriented (AO) concepts based on theme approach....

Pages: 193-208
Construct a Simulator of a Proposed Trust and Reputation Model in (PD) P2P File Sharing Systems

Dujan B. Taha, Abdullah M. Salih,

Trust concept is an important requirement for sustained interactions between peers, and to deal with malicious peers in P2P file sharing systems. Traditional security mechanisms and services are...

Pages: 151-165
Generating a New Hyperchaotic Pan System Via State Feedback Control

Saad Fawzi AL-Azzawi,

This paper proposes a new four-dimensional continuous autonomous hyperchaotic system based on the 3D Pan system by introducing a nonlinear state feedback controller. Dynamical behaviors of the new...

Pages: 229-241
Extraction and Recognition of Color Feature in true Color Images Using Neural Network Based on Colored Histogram Technique

Orjuwan M.A. Aljawadi,

In this research, a neural network using backpropagation (BPNN) algorithm was trained and learned to work as the cone cells in human eyes to recognize the three fundamental cells colors and hues,...

Pages: 167-181
The n-Hosoya Polynomial of ??⊠ Cβ

Ahmed M. Ali, Haveen G. Ahmed,

For a wheel and a cycle the composite graphs is constructed from the union of and and adding the edges and , where is an edge of andis an edge of . The n diameter , the n Hosoya polynomial and...

Pages: 139-150
On n-Weakly Regular Rings

Raida D. Mahammod, Mohammed Th. Al-Neimi

As a generalization of right weakly regular rings, we introduce the notion of right n-weakly regular rings, i.e. for all aN(R), aaRaR. In this paper, first give various properties of right n-weakly...

Pages: 53-59
On m-Regular Rings

Zubayda M. Ibraheem, Maha F. Khalaf

As a generalization of regular rings, we introduce the notion, of m-regular rings, that is for all , there is a fixed positive integer m such that is a Von-Neumann regular element. Some...

Pages: 61-70
Romberg Algorithm to Solve a System of Nonlinear Fredholm Integral Equations of Second Kind

Abbas Y. Al-Bayati, Rostam K. Saeed, Kawa M. Aziz,

In this paper, we use Romberg algorithm, to find an approximation solution for a system of nonlinear Fredholm integral equations of the second kind. A comparison between this approximations and...

Pages: 41-52
Numerical Solution of a Reaction-Diffusion System with Fast Reversible Reaction by Using Adomian’s Decomposition Method and He’s Variational Iteration Method

Ann Jalal, Mohammed O. Al-Amr,

In this paper, the approximate solution of a reaction-diffusion system with fast reversible reaction is obtained by using Adomian decomposition method (ADM) and variational iteration method (VIM)...

Pages: 243-257
Evaluate and comparission between Software Engineering Methodologies of Agent Systems

Asmaa Yaseen Hammo, Maher Talal Alasaady,

Agent based systems software engineering is a new model in the field of software engineering. It provides new approaches for developing agent based systems. Numerous methodologies for agent based...

Pages: 43-61
A Hybrid Algorithm from Cuckoo Search Method with N-Queens Problem

Isra N. Alkallak,

This paper tackled cuckoo search method. The method is one of optimization methods with N-queens problem through proposed hybridization algorithm which mimics the behavior of cuckoo to reach the...

Pages: 183-192
On i α- Open Sets

Amir A. Mohammed, Omar y. kahtab,

In this paper, we introduce a new class of open sets defined as follows: A subset A of a topological space is called i-open set, if there exists a non-empty subset O of X, , such that. Also, we...

Pages: 219-228
DNA Sequences as a Medium for Steganography Method of Codon Frequency with Character Frequency

Ahmed S. Nori, Sadoon H. Abdullah,

The present study included an application of new method of steganography using DNA sequence as a medium for hiding. This method is considered as a secret cover for the secret message (text, image),...

Pages: 99-112
Clustering and Detecting Network Intrusion Based on Fuzzy Algorithms

Manar Y. Kashmola, Bayda I. Khaleel,

Clustering or (cluster analysis ) has been widely used in data analysis and pattern recognition. There are several algorithms for clustering large data sets or streaming data sets, Their aims to...

Pages: 125-138
Local Existence Theorem of Fractional Differential Equations in Lp Space

Joseph Gh. Abdulahad, Shayma A. Murad,

We proved the existence of P-integrable solution in -space, where for the fractional differential equation which has the form: with boundary condition where is the Caputo fractional derivative,...

Pages: 71-78
Using Genetic Algorithm to Reduce the Noise Effect on Images

Baydaa S Bhnam,

This paper deals with a problem that concentrates on the noise removal that the images are affected from different resources employing Genetic Algorithm with filters. To achieve the aims of the...

Pages: 127-142
Thin Films Flow Driven on an Inclined Surface

Khider M.S. Khider,

The flow of unsteady incompressible two dimensional system flow of a thin liquid films with negligible inertia is investigated. Continuity equation and Navier-Stokes equations are used to obtain...

Pages: 209-217
Sound Signal De-noising Using Wavelet Transform

Yusra Faisal Al-Irhaim, Ahmad Mohammd Suliman,

In this paper, the Discrete Wavelet Transform is studied in purifying the sound signal from noise because of the good capabilities in this scope, especially when it is merged with both types of the...

Pages: 143-157
Fractal Compression of Colored Animated Pictures

Basil Thanoon Younis, Abeer Abdul Khaliq Thanoon,

This research deals with the question of pressing two series of video images by using the pressing Fractal through the use of iterative function systems, where the film frame video acquired is...

Pages: 27-41
A New Preconditioned Inexact Line-Search Technique for Unconstrained Optimization

Abbas Y. Al-Bayati, Ivan S. Latif,

In this paper, we study the global convergence properties of the new class of preconditioned conjugate gradient descent algorithm, when applied to convex objective non-linear unconstrained...

Pages: 25-39
Determined the Edges Using the ant Colony Algorithm and Apply them to Medical Images

Maha Abdul Rahman Hasso, Aseel Ismail Ali,

Ant Colony Optimization (ACO) is a method of heuristic search using in general artificial intelligence (swarm intelligence) to simulate the behavior of the aggregate food for ants to find new...

Pages: 63-79
Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset

Mafaz Mohsin Khalil Alanezi, Najlaa B. Aldabagh,

Many real world problems involve the simultaneous optimization of various and often conflicting objectives. Evolutionary algorithms seem to be the most attractive approaches for this class of...

Pages: 109-123
Compression of Digital Image based on Hybrid Heuristic Algorithm

Fawziya Mahmood Ramo, Yaser Noor Al Deen,

In this research paper a system has been proposed to be used in data compression of digital image based on two hybrid intelligent Algorithms. In the first algorithm which is now as Meta Heuristic...

Pages: 159-171
Traffic sign recognition by using chain code

Sundus Khaleel Ebraheem, Reham Jassim Al-Atiwi,

The Traffic signs are considered as Traffic Safety tools, Because of their role in the organization of traffic and vehicles to insure the safety of the passengers, pedestrians and the structures of...

Pages: 113-126
w-Hosoya Polynomials for Connection for Some Special Graphs

Ahmed M. Ali, Assma Salah Aziz, Hafen Jalal Ahmed,

Let and be any two distinct vertices in a connected graph . A container is a set of internally disjoint -paths. The width of is denoted by or is , and the length of is the length of the longest...

Pages: 173-184