Volume 8 Issue 1

Published: 2025-06-25

Contents


Research Paper
Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs

Adel S. Issa,

With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recent...

Pages: 79-87
Existence, Uniqueness and Stability Theorems for Certain Functional Fractional Initial Value Problem

Joseph G. Abulahad, Shayma A. Murad,

In this paper, we deal with non-linear functional fractional differential equation with initial condition in space. We will study the existence, uniqueness and stability of the solution of...

Pages: 59-70
Comparison of Finite Difference Solution Methods for Reaction Diffusion System in Two Dimensions

Abbas Y. Al-Bayati, Abdulghafor M. Al-Rozbayani, Saad A. Manaa,

In this paper, we study three types of finite difference methods, to find the numerical solution of reaction difference systems of PDEs in two dimensions. These methods are ADE, ADI and Hopscotch,...

Pages: 21-36
A Survey of Two Optimization Methods to Solve a Modified Minimal Spanning Tree Problem in Undirected Tree Graph

Isra N. Alkallak, Ruqaya Z. Sha’ban,

The paper tackled a survey of two optimization methods to study spanning tree problem by modifying the spanning tree problem to generate all of possible solutions in undirected tree graph with...

Pages: 117-134
Existence Results of Fractional Mixed Volterra -Fredholm Integrodifferential Equations with Integral Boundary Conditions

Sohaib T. Hasan, Rabeea M. Hani,

In this paper, we give an existence results for the fractional mixed Volterra -Fredholm integrodifferential equation with Integral Boundary Conditions. First, we use the Banach contraction...

Pages: 157-169
New Construction and New Error Bounds for (0, 2, 4) Lacunary Interpolation By Six Degree Spline

Karwan H. Jwamer, Ridha G. Karem,

The object of this paper obtains the existence, uniqueness and upper bounds for errors of six degree splines interpolating the lacunary data (0, 2, 4). We also show that the changes of the boundary...

Pages: 37-46
Stability Analysis of Flow in Thin Liquid Film Under Heat Effect

Zena Talal Al-Nuamy,

This research is dedicated for analyzing the stability of system of flow equations for a delicate chip of a fluid exposed for medium heat ,where we found the growth of disturbance exist or not...

Pages: 57-64
Studying the Stability of one of Non-Linear Autoregressive Models with Application

Abdulghafoor Gasim Salim, Raadi Awad Alhamdan,

In This paper we suggest one of the models for non-linear Autoregressive by using local linear approximation method, then we studied the conditions of stationarity of the model specifically the...

Pages: 149-159
Hybrid Technique Used for Straight Line Detection

Fawziya Mahmood Ramo, Khalil I. Al-Saif, Nidhal Al-Assady,

Many techniques have been used in this research to detect straight line in digital image on the same samples. These techniques are:1-Hough Transform(HT), Develpoed Barons Method (DBM)and-Genetic...

Pages: 89-103
New Hybrid Cutting Plane Method For Solving Integer Linear Programming Problems

Abbas Y. Al-Bayati, Nawar N. Abdullah,

This work deals with a new method for solving Integer Linear Programming Problems depending on a previous methods for solving these problems such that Branch and Bound method and Cutting Planes...

Pages: 13-24
Embedding and Extracting the Watermark in Video Files using Intelligent Techniques

Shahba I. Khaleel,

This research, design a watermarking system for embedding and extracting the watermark in video files. This research presented four-efficient and powerful ways to embed and extract the watermark,...

Pages: 25-44
On N–Flat Rings

Raida D. Mahmood, Husam Q. Mohammad,

Let I be a right ideal of R, then R / I is a right Nflat if and only if for each a I, there exists b I and a positive integer n such that an 0 and an = ban. In this paper, we first give and...

Pages: 71-77
Efficiency of Four Virtual LANs Switches with Equal Processing Times

Jassim M. Abdul-Jabbar, Wijdan Y.A. Al-Karim, Rana A. Mohamed,

Virtual LANs (VLANs) are introduced as some alternative switches to solve for the traffic problems of those LAN networks with Hubs. The idea is to create some collections in the whole LAN network,...

Pages: 147-156
An Approximate Solution to The Newell-Whitehead Equation by Adomian Decomposition Method

Saad A. Manaa,

In this paper, we solved the Newell-Whitehead equation approximately using Adomain Decomposition method and we have compared this solution with the exact solution; we found that the solution of...

Pages: 171-180
Speech Synthesis of Arabic Vocabularies

Enaam Ghanim Saeed,

In this paper, system is presented for speech synthesis of Arabic vocabularies written with diacritics, graphemes transfer to allophones by applying the phonological rules. The system depend on...

Pages: 97-107
Recognition of Printed English Characters Using Morphological Operations

Rana A. Mohammed,

A morphological printed English character recognition approaches for binary images is shown in this research. Three morphological operations are used for printed English character recognition:...

Pages: 135-145
Adopting Egin Value of Speech Signal in Distinguishing the Gender of the Speaker

Maysoon Khidr Al-Nuaimi,

In this research a new approach was to represent the speech signal into two dimensional array to make it suitable for evaluating the egin value for this signal. So many samples of speech signal for...

Pages: 45-56
Iterative Image Interpolation vs. Traditional Interpolation Methods

Samia Sh. Lazar,

Image interpolation is an important image processing operation applied in diverse areas ranging from computer graphics, rendering, editing, medical image reconstruction, and online image viewing....

Pages: 105-116
Employment the Object Oriented Idea with Relational Database using by Ado.Net

Ban Ghanm M.,

With the development of technology and appearing of computers that simplified many of computer and logical applications, so the developed with all capabilities to take and give the benefit in the...

Pages: 109-129
Dual Hiding in Digital Image Files

Farah Tareq Mohammed,

The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission...

Pages: 131-147
The Extended CG Method for Non-Quadratic Models

Abbas Y. Al-Bayati, Basim A. Hassan, Sawsan S. Ismael,

This paper investigates an interleaved algorithm which combines between the extended conjugate gradient with the hybrid method of Touati-Storey. This combined algorithm is based on the exact line...

Pages: 13-30
Neural Network with Madaline for Machine Printed English Character Recognition

Shaymaa M. Al-mashahadany

The recognition of optical characters is known to be one of the earliest applications of Artificial Neural Networks, which partially emulate human thinking in the domain of artificial...

Pages: 47-58
Studying the Stability of One of Non-Linear Autoregressive Relational Models

Abdulghafoor Gasim Salim, Hamed Mohammed Kalaf,

Time series are usually built on basic assumptions involving stability, Linearity and normality, these three features are so important in both estimating and building the time series models. The...

Pages: 81-95
Finite Differences Methods for solving Korteweg-de Vries-Burger's Equation

Ekhlass S. Al-Rawi, Almutasim Albaker,

In this paper we solved the Korteweg-de Vries-Burger's equation numerically by finite difference methods, using two different schemes which are the Fully Implicit scheme and the Exponential finite...

Pages: 65-80