Volume 10 Issue 4
Published: 2025-06-25
Contents
Research Paper
Study and Developing a Network Security Prototype Based on Agent Technology
Najla Badie Ibraheem, Haleema Essa Sulaiman,
ABSTRACT A preliminary prototype has been designed and implemented in this work to support network security that used to detect a misuse in the network environment, the events have been taken from...
The Effect of Inclination into Heat Convection Flow of Dissipative Fluid in a Channel of Porous walls
Tagread H. Shuker
This paper is devoted to the study of the effect of inclination into heat transfer by natural convection of fluid flowing through a channel with porous walls; the model has been created by using...
Applying Gene Expression Programming for Solving One-Dimensional Bin-Packing Problems
Najla Akram Al-Saati,
This work aims to study and explore the use of Gene Expression Programming (GEP) in solving on-line Bin-Packing problem. The main idea is to show how GEP can automatically find acceptable heuristic...
New Reverse Engineering Tool to Transform Oracle10g Code to Entity Relationship Model
Nada N. Saleem, Saad Ahmed Th.,
Reverse engineering is one of the important operations performed on programming codes to get their design presented graphically. Reverse engineering is performed on various types of databases to...
Hybridization of the Artificial Immune Network Using the Backpropagation Neural Network
Omar Saber Qasim, Israa Rustum Mohammed,
In this research building style simulation developed is applied in the field of pattern recognition medical patients osteoporosis through a process of integrating and hybridization between...
Online Face Detection and Recognition in a Video Stream
Maha A. Hasso Al-Ghurery, Manar A. Zidan Al-Abaji,
Faces detection and recognition process received considerable attention during the past decade, it is still considered one of the most important studies in the field of Image Processing, Pattern...
On WJCP-Injective Rings
Raida D. Mahmood, Shahla M. Khalil,
As a generalization of right injective rings, we introduce the nation of right injective rings, that is for any right nonsingular element of R, there exists a positive integer and and any right -...
Hybrid Genetic Algorithm with Filters to Image Enhancement
Baydaa S Bhnam
Image enhancement is a useful and necessary part of image processing and its analysis. The quality of an image could be corrupted by different kinds of noises, added due to the undesired conditions...
A Globally Convergence Spectral Conjugate Gradient Method for Solving Unconstrained Optimization Problems
Basim A. Hassan,
In this paper, a modified spectral conjugate gradient method for solving unconstrained optimization problems is studied, which has sufficient descent direction and global convergence with an...
Design Hybrid Algorithm for Video Encoding
Ghada Mohammad Tahir Qasim, Toqa Zuhair, Sahar Saleh, Amena Emad,
The most of the related studies and researches have focused on encrypting video files on speed and accuracy in the process of encryption. Some of them have focused on reducing the time required for...
Using the Genetic Algorithm in Developing a Method for Steganography
Nadia M. Mohammed,
This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two...
Hiding digital image watermarking in a sound signal using Wavelet Transform and Singular Value Decomposition
Alyaa Moufaq Abdul Majeed Haleem, AlAA Zakaria,
The outgrowing of multimedia applications in communications network brought about an increasing need to provide qualified methods to protect these media and secure communication. These methods...
Hybrid System: Parallel Neural -Genetic Algorithm Algorithm for Compacting Fractal Images Using Multiple Computers
Shahla A. Abdel-Qader, Suzan K. Ibrahim, Omia Gh. Abdel-Jabbar,
Recently, effective technologies in Fractal Image Coding (FIC) were used to reduce the complexity of search for the matching between the Range blocks and the Domain blocks which reduces the time...
Rule Based Planning for Solving Hanoi Problem
safwan hasoon
In this research, the planning intelligence technique has been developed and applied to solve the tower of Hanoi puzzle through the construction of the rule based included a set of facts and rules...
Smarandache Rings and Smarandache Elements
Parween A. Hummadi, Shadan A. Osman,
In this paper, we study some Smarandache (S) notions in some types of rings. Conditions are given under which is a Smarandache ring. We study Smarandache ideals, Smarandache subrings and...
New Scale Dai-Yaun Conjugate Gradient Method for Unconstrained Optimization
Hamsa Th. Chilmerane,
Conjugate gradient algorithm is widely used for solving large-scale unconstrained optimization problems, because they do not need the storage of matrices. In this paper, we suggest a modified...
On Maximal Chains In Partially Ordered Sets With Compatible (Left, Right)- Group Actions
Abdul Aali J. Mohammad, Eman M. Tahir,
In this paper, we deal with compatible (left, right)-group actions on posets, i.e; (G, H)-posets. Our main purpose in this work is to study the maximal chains in (G, H)-posets to observe that this...
Nullity and Bounds to the Nullity of Dendrimer Graphs
Khidir R. Sharaf, Didar A. Ali,
In this paper, a high zero-sum weighting is applied to evaluate the nullity of a dendrimer graph for some special graphs such as cycles, paths, complete graphs, complete bipartite graphs and star...
Review Paper
Using Exponential Finite Difference Method for Solve Kuramoto-Sivashinsky Equation with Numerical Stability Analysis
Abdulghafor M. Al-Rozbayani, Shrooq M. Azzo,
In this paper we solved the Kuramoto-Sivashinsky Equation numerically by finite-difference methods, using two different schemes which are the Fully Implicit scheme and Exponential finite difference...
Stability Analysis of Anonlinear Autoregressive Model of First Order
Abdulghafoor Gasim Salim, Abeer Abdulkhaliq Ahmed,
In this paper, we study the moment of a non linear autoregressive polynomial model of first order, also we analysis the stability of this model and find the singular point as well as the limit...