Volume 8 Issue 1
Published: 2025-06-25
Contents
Research Paper
Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs
Adel S. Issa,
With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recent...
Existence, Uniqueness and Stability Theorems for Certain Functional Fractional Initial Value Problem
Joseph G. Abulahad, Shayma A. Murad,
In this paper, we deal with non-linear functional fractional differential equation with initial condition in space. We will study the existence, uniqueness and stability of the solution of...
Comparison of Finite Difference Solution Methods for Reaction Diffusion System in Two Dimensions
Abbas Y. Al-Bayati, Abdulghafor M. Al-Rozbayani, Saad A. Manaa,
In this paper, we study three types of finite difference methods, to find the numerical solution of reaction difference systems of PDEs in two dimensions. These methods are ADE, ADI and Hopscotch,...
A Survey of Two Optimization Methods to Solve a Modified Minimal Spanning Tree Problem in Undirected Tree Graph
Isra N. Alkallak, Ruqaya Z. Sha’ban,
The paper tackled a survey of two optimization methods to study spanning tree problem by modifying the spanning tree problem to generate all of possible solutions in undirected tree graph with...
Existence Results of Fractional Mixed Volterra -Fredholm Integrodifferential Equations with Integral Boundary Conditions
Sohaib T. Hasan, Rabeea M. Hani,
In this paper, we give an existence results for the fractional mixed Volterra -Fredholm integrodifferential equation with Integral Boundary Conditions. First, we use the Banach contraction...
New Construction and New Error Bounds for (0, 2, 4) Lacunary Interpolation By Six Degree Spline
Karwan H. Jwamer, Ridha G. Karem,
The object of this paper obtains the existence, uniqueness and upper bounds for errors of six degree splines interpolating the lacunary data (0, 2, 4). We also show that the changes of the boundary...
Stability Analysis of Flow in Thin Liquid Film Under Heat Effect
Zena Talal Al-Nuamy,
This research is dedicated for analyzing the stability of system of flow equations for a delicate chip of a fluid exposed for medium heat ,where we found the growth of disturbance exist or not...
Studying the Stability of one of Non-Linear Autoregressive Models with Application
Abdulghafoor Gasim Salim, Raadi Awad Alhamdan,
In This paper we suggest one of the models for non-linear Autoregressive by using local linear approximation method, then we studied the conditions of stationarity of the model specifically the...
Hybrid Technique Used for Straight Line Detection
Fawziya Mahmood Ramo, Khalil I. Al-Saif, Nidhal Al-Assady,
Many techniques have been used in this research to detect straight line in digital image on the same samples. These techniques are:1-Hough Transform(HT), Develpoed Barons Method (DBM)and-Genetic...
New Hybrid Cutting Plane Method For Solving Integer Linear Programming Problems
Abbas Y. Al-Bayati, Nawar N. Abdullah,
This work deals with a new method for solving Integer Linear Programming Problems depending on a previous methods for solving these problems such that Branch and Bound method and Cutting Planes...
Embedding and Extracting the Watermark in Video Files using Intelligent Techniques
Shahba I. Khaleel,
This research, design a watermarking system for embedding and extracting the watermark in video files. This research presented four-efficient and powerful ways to embed and extract the watermark,...
On N–Flat Rings
Raida D. Mahmood, Husam Q. Mohammad,
Let I be a right ideal of R, then R / I is a right Nflat if and only if for each a I, there exists b I and a positive integer n such that an 0 and an = ban. In this paper, we first give and...
Efficiency of Four Virtual LANs Switches with Equal Processing Times
Jassim M. Abdul-Jabbar, Wijdan Y.A. Al-Karim, Rana A. Mohamed,
Virtual LANs (VLANs) are introduced as some alternative switches to solve for the traffic problems of those LAN networks with Hubs. The idea is to create some collections in the whole LAN network,...
An Approximate Solution to The Newell-Whitehead Equation by Adomian Decomposition Method
Saad A. Manaa,
In this paper, we solved the Newell-Whitehead equation approximately using Adomain Decomposition method and we have compared this solution with the exact solution; we found that the solution of...
Speech Synthesis of Arabic Vocabularies
Enaam Ghanim Saeed,
In this paper, system is presented for speech synthesis of Arabic vocabularies written with diacritics, graphemes transfer to allophones by applying the phonological rules. The system depend on...
Recognition of Printed English Characters Using Morphological Operations
Rana A. Mohammed,
A morphological printed English character recognition approaches for binary images is shown in this research. Three morphological operations are used for printed English character recognition:...
Adopting Egin Value of Speech Signal in Distinguishing the Gender of the Speaker
Maysoon Khidr Al-Nuaimi,
In this research a new approach was to represent the speech signal into two dimensional array to make it suitable for evaluating the egin value for this signal. So many samples of speech signal for...
Iterative Image Interpolation vs. Traditional Interpolation Methods
Samia Sh. Lazar,
Image interpolation is an important image processing operation applied in diverse areas ranging from computer graphics, rendering, editing, medical image reconstruction, and online image viewing....
Employment the Object Oriented Idea with Relational Database using by Ado.Net
Ban Ghanm M.,
With the development of technology and appearing of computers that simplified many of computer and logical applications, so the developed with all capabilities to take and give the benefit in the...
Dual Hiding in Digital Image Files
Farah Tareq Mohammed,
The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission...
The Extended CG Method for Non-Quadratic Models
Abbas Y. Al-Bayati, Basim A. Hassan, Sawsan S. Ismael,
This paper investigates an interleaved algorithm which combines between the extended conjugate gradient with the hybrid method of Touati-Storey. This combined algorithm is based on the exact line...
Neural Network with Madaline for Machine Printed English Character Recognition
Shaymaa M. Al-mashahadany
The recognition of optical characters is known to be one of the earliest applications of Artificial Neural Networks, which partially emulate human thinking in the domain of artificial...
Studying the Stability of One of Non-Linear Autoregressive Relational Models
Abdulghafoor Gasim Salim, Hamed Mohammed Kalaf,
Time series are usually built on basic assumptions involving stability, Linearity and normality, these three features are so important in both estimating and building the time series models. The...
Finite Differences Methods for solving Korteweg-de Vries-Burger's Equation
Ekhlass S. Al-Rawi, Almutasim Albaker,
In this paper we solved the Korteweg-de Vries-Burger's equation numerically by finite difference methods, using two different schemes which are the Fully Implicit scheme and the Exponential finite...