Volume 11 Issue 2
Published: 2025-06-25
Contents
Article
ON MULTIVALENT HARMONIC MEROMORPHIC FUNCTIONS INVOLVING HYPERGEOMETRIC FUNCTIONS
ABDULRAHMAN SALMAN JUMA,
In this paper we introduce a subclass of multivalent harmonic meromorphic functions defined in the exterior of the unit disk by using generalize hypergeometric functions. We derived sufficient...
Stability Analysis of the Flow of Aqueous Humor in the Posterior Chamber to the Human Eye.
- -,
This paper is devoted to analyze the stability of the flow of a aqueous humor in posterior chamber of the human eye. This analysis is done by finding the eigenvalues of the system which enable us...
Thin films flow by inertia forces
- -,
In this paper we consider the motion in thin liquid films of a rectilinear flow by inertia force and there is a balance of pressure gradient, viscous and surface tension.Navier stokes equations...
Sound Encryption Using Feature Extraction and Neural Network
Alyaa Moufaq, Melad Jader, Ielaf O. Abdul-Majjed
In recent years, secure communication techniques have increased widely and unexpectedly . In order to establish reliable communication technology and to ensure that the data (sound) reaches its...
Self-tuning PID Controller using Genetic Algorithm
Abdul-Kareem Z. Mansoor, Thair A. Salih, Mohamed Y. Hazim
This work presents design, modeling, simulation and hardware implementation of a separately excited DC motor speed control using Field Programmable Analog Array (FPAA) Technology. The framework...
Design and implementation of the hybrid system for encryption and hiding the text file in the Voice over Internet Protocols.
- -,
The immense development in the communication network has opened new spheres that threaten the data security transferred via the communication networks. As a consequence the techniques of encryption...
Spotlights on Chaos Theory Basil Younis Thanoon
- -,
This paper sheds light on the theory of chaos, which is one of the latest mathematical theories. Some aspects of the scientific, applied and philosophical fields related to this theory are studied,...
Conjugate Gradient Back-propagation with Modified Polack –Rebier updates for training feed forward neural network
Abbas Al-Bayati, Ibrahem A. Saleh, Khalil K. Abbo,
Several learning algorithms for feed-forward (FFN) neural networks have been developed, many of these algorithms are based on the gradient descent algorithm well-known in optimization theory which...
Recognition of Warping Face Image and Morphing Face Image of Two Warping Image Using Hidden Markov Model
- -,
In this paper, using algorithm models of Hidden Markov models, it has been concluded that the possibility of recognizing the warp face and the morph face the image real departments face on...
Multi-Periods Dynamic Inventory Model
- -,
In this paper the probabilistic multi-item inventory model is derived when the holding cost is a function of the order quantity, and restricted by a non-linear restriction imposed on this cost. The...
An approximate Solution of Heat Equation in Three Dimensions by LOD Method
- -,
In this paper, we solve one of the parabolic partial differential equations in three dimensions which is heat equation with Locally One Dimension methods, and by comparing the results by this...
Scaled Fletcher-Revees Method for Training Feed forward Neural Network
Basher M. Khalaf, Khalil K. Abbo
The training phase of a Back-Propagation (BP) network is an unconstrained optimization problem. The goal of the training is to search an optimal set of connection weights in the manner that the...
Estimation and Structure of Bayesian Tests for the Scale and Loction Parameters in Multivaiate- t distrbution
- -,
This paper deals with two problems Bayesian estimation and hypothesis tests to the parameters of Multivaiate- t distrbution when the degrees of freedom of distribution is known with the...
A Spectral Conjugate Gradient Method with Inexact line searches
Abbas Y. Al-Bayati, Basim A. Hassan
In this paper, a new Spectral Conjugate Gradient (SCG) method for solving unconstrained optimization problems; based on inexact line searches is investigated. The search directions of the new CG...
Multi-Objective GPP with General Negative Degree of Difficulty: New Insights
Abbas Y. Al-Bayati, Huda E. Khalid
The methods for solving nonlinear multi-objective optimization are divided into three major categories: methods with apriori articulation of preferences, methods with a posteriori articulation of...
A Study of the stability for one of non-linear autoregressive models with trigonometric terms with application
- -,
In this paper we study the stability of one of non-linear autoregressive models with trigonometric terms , by using the linear approximation technique . From this method the singular point and the...
Transformation Linear Membership Function by Using the Modified S- Curve
Abdul Rahim K.Rahi and Shorish Omer Abdulla,
In this paper, we concentrate on two cases of fuzzy linear programming problems (FLPP): LPP with coefficient of objective function and coefficient of available resources and constraint are...
Non-Linear Dynamic Modelling and Morecasting in Numbers of Patients with Cancer Disease in Nineveh City by Using Bayesian Approach
- -,
This research deals with modeling cumulative number of patients with cancer disease in Nineveh Iraq. The method is based on classes of Exponential Growth Models and uses the ideas of Non-Linear...
The spectral form of the Dai-Yuan conjugate gradient algorithm
Abdul-Ghafoor J. Salem, Khalil K. Abbo
Conjugate Gradient (CG) methods comprise a class of unconstrained optimization algorithms which are characterized by low memory requirements and strong local and global convergence properties. Most...
Optimal 2D Boards Cutting Using Genetic Algorithm
- -,
According to the development in computing industries and production Management ,in this research we focus on the design and application of of the main stages of production , a phase of cutting the...
Constructing χ2 Chart by Using Bayesian Approach with Application
- -,
In this study, new charts were formed using Baysian technique and they were called Baysian chart (2B) , to control the average . The control chart (2B) was used and the process includes real data...
Around the Probability Distribution of The Estimated Random Ridge Factor with Stochastic Prior Information
- -,
In this paper, The probability distribution of the estimated stochastic ridge factor has been found, which has been developed by adding prior information to the sample information. These...
Estimation of Multiple Logistic Model by Using Empirical Bayes Weights and Comparing it with the Classical Method with Application
- -,
In this research, a solution of heteroscedastisity of the random error variance is found in the Multiple Logistic Model when the response variable (dependent) variable is Qualitative by using the...
Adomian Decomposition Method for Solving Parabolic Partial Differential Equations in Three Dimensions
- -,
In this paper, we use the approximate solution of linear partial differential equations in three dimensions of the parabolic type by using Adomian Decomposition Method (ADM). Comparing the...
A study of the stability of an amplitude-dependent exponential autoregressive model with application
Abdul Ghafoor Jasim Salim, Kaies Esmaeel, Haneen Talal Jasim
In this paper we studied and found the stability conditions of the (AEXPAR) model by using a dynamical approach and by adopting the linear approximation technique.
A descent modified Hager-Zhang conjugate gradient method and its global convergence
Ghada M. Al-Naemi, Huda I. Ahmed
In this paper, based on the memoryless BFGS quasi-Newton method, we propose a new modified Hager-Zhang (HZ) type method. An attractive property of the proposed method is that the direction...
Comparison among information hiding methods in DNA Sequences
- -,
By research, three methods for hiding secret message were proposed. In the first one the secret message was hid in a known DNA sequence belongs to prokaryotic organism Escherichia Coli k12 (E.Coli...
Developing an Advertisement System for Colleges
- -,
Departments colleges suffer from the problems that exist in the system of traditional advertising based primarily on the use of bulletin boards and the manner in which the paper is characterized by...
An Optimized Genetic Algorithm-based Approach for Steganography
- -,
In this paper, a new steganographic technique was proposed. First, the cover colored image (of type BMP, PNG) transfered to a gray image, then the result divided into many blocks to embed the...
Simulation TMJ clinic by Using Intelligence Techniques
Anhar Khairy Al-Deen, Reem Ali Al-Jarah, Baseer Ali Abd Allah,
The research aims is structuring the TMJ clinic; it is a computerized system that diagnoses and treats the clinical cases through a computing statistical basis for the serious cases.This system...
Superiority of the MCRR Estimator Over Some Estimators In A Linear Model
Feras Sh. M. Batah,
Modied (r, k) class ridge regression (MCRR) which includes unbiased ridge regression (URR), (r, k) class, principal components regression (PCR) and the ordinary least squares (OLS) estimators is...
Exact Solutions for Some Partial Differential Equations by Using First Integral Method
- -,
In this paper, some exact solutions for the convectiondiffusionreaction equation in two dimensions and a nonlinear system of partial differential equations are formally derived by using the first...
Hiding Text Data in Karhunen Loeve Space by Using a Random Formula in Digital Images
- -,
The increasing growth of the multimedia on the network led to increasing the need to offer efficient methods to protect data and the individual property. The aim of hiding the information is to...
Palmprint Recognition Using Contourlet Feature Extraction and Backpropagation Neural Network Classifier
laheeb M. Alzoubiady, Ibrahim A. Saleh
Palm print biometrics technology is highest used for human identity verification in most of security application. In this research the automated biometric system based palmprint biometric technique...
Reliability of Acceptance Sampling Plans for Gamma-Distribution Life Times Under Hybrid Censoring Scheme
- -,
This paper deals with Reliability of Acceptance Sampling Plan (RASP) which differs from ordinary sampling plan for a static quality characteristic,since it involves a non-normal fail time...
A Comparison between some Statistical Analyses in a Study of the Power of pH and the Concentration of CO2 in Tigris River Through Mosul City
- -,
Al-Sanjary (2001) mentioned the values of mean and standard deviation of the power of hydrogen (pH) and concentration of carbon dioxide (CO2) in the water of Tigris river in Mosul city, the study...
A Constrained Probabilistic Multi-Item Inventory Model
- -,
In this paper the probabilistic multi-item inventory model is derived when the holding cost is a function of the order quantity, and restricted by a non-linear restriction imposed on this cost. The...
Characterizing Internal and External Sets
Tahir H. Ismail and and, Hind Y. Saleh, Barah M. Sulaiman
The aim of this paper is to give a characterization between the external and internal sets, and some relation between the galaxies and monads, according to this paper we obtain the following...
A proposed algorithm based on linear programming approach for three-stage three jobs flow shop scheduling with criteria : minimize makespan
- -,
This research has proposed an algorithm to find the optimal schedule for three jobs in flow shop environment with three stages , so that the makespan is less than what can be.This algorithm is...
Building and Studying some models of State Space of Brain waves Frequency to identify the reasons of pilepsy
- -,
The research objective adoption idea came to build and study the state space models to identify the reasons of epilepsy on basis of the brain waves frequency, where two models have been built, the...
Finding Optimal Strategy for Static Games by Using Genetic Algorithm
- -,
In this paper, one of the artificial intelligence algorithms was used, which is the genetic algorithm that is based on the application of innovative concepts including selection, crossover and...
Numerical Solution for Non-linear Korteweg-de Vries-Burger's Equation Using the Haar Wavelet Method
- -,
In this paper, an operational matrix of integrations based on the Haar wavelet method is applied for finding numerical solution of non-linear third-order korteweg-de Vries-Burger's equation, we...
Rate of Convergence for a New Family of Summation-Integral Beta Operators
Ali J. Mohammad and Ansam A. Abdul-Rahman,
In the present paper, we define a new family of summation-integral Beta operators to approximate a class of unbounded continuous functions of polynomial growth , for some and then we estimate the...
Digital Image Watermarking Algorithm in Discrete Wavelet Transform Domain Using HVS Characteristics
Nasseer Moyasser Basheer, Shaimaa Salah Abdulsalam
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. Watermarking is identified as a major means to achieve copyright...
A Modified Conjugate Gradient Method using multi-step in Unconstrained Optimization
- -,
In this paper we proposed a new HS type conjugate gradient method by using two kind of modification, first derived a new non-quadratic model second using structure of the memoryless BFGS...
A New Type of Conjugate Gradient Method with a Sufficient Descent Property
Abbas Y. Al-Bayati, Basim A. Hassan
This paper presents the development and implementation of a new unconstrained optimization method; based on the inexact line searches. Our new proposed Conjugate Gradient (CG) method always...
A New Extended PR Conjugate Gradient Method for Solving Smooth Minimization Problems
Abbas Y. AL-Bayati, Rana Z. AL-Kawaz
In this paper, we have discussed and investigated an extended PR-CG method which uses function and gradient values. The new method involves the extended CG-methods and have the sufficient descent...
Numerical Solution of Coupled-BBM Systems of Boussinesq type by Implicit Finite Difference Method
Ekhlass S. Al-Rawi, Muhannad A. Mahmoud
In this paper we study a numerical solution of coupled BBM systems of Boussinesq type, which describes approximately the two ways propagation of surface wave in a uniform horizontal channel of...
Prediction by Regression and kriging for Spatial Data with Application
- -,
This study deals with the prediction of the non-stationary spatial stochastic process. The prediction is done by two techniques which are regression technique (generalized least square estimation)...
Face Detection Using Neural Networks
Ramadan M. Ramo, Fawziya M. Ramo,
This research detects the existence of the face in the digital images by using an Elman network, after a number of stages where at first it converts the image to the gray level and then...
Recognition using Chain Code
- -,
The process of recognizing the processed patterns makes the pattern data useful for the computer. It plays a significant role in the field of pattern recognition and computer vision. So, the image...
Speech compression based on wavelet and contourlet Transformation
Khalil I. Alsaif, Hadia Salih Albadrani
Speech compression is very important in many applications. In this research we applied compression on speech by using wavelet transform and contourlet transform. By taking speech (which is often...
A Fuzzy Computer System for the Classification of Medical Conditions
- -,
This research deals with the actual medical data including a number of variables such as Systolic Blood Pressure (SBP) Total Cholesterol (TC) and high density lipoprotein .a computer system is...
Comparison between the method of Fuzzy Control and Discriminate Function in the classification of some wells Nineveh
- -,
In this study, the construction of a Fuzzy Inference Control to determine the validity of the quality of ground water wells of some of Nineveh province, through a series of observations that were...
A New Suggested Method for the Selection of Best Regression Equation Depending on the Partial Correlation coefficient
- -,
This research suggested a new heuristic method to select the best regression equation. Assuming that we have a set of predictor variables. The choice of some of those variables is required to...
Stability Analysis of the Evaporation of a Tear Film over a Contact Lens
- -,
The aim of this paper is to analyes the stability of a system of flow and evaporation liquid of tear film throw the pre-lens tear film (PrLTF) of contact lens in eye porous layer which infected by...
Statistical and Chaotic Analysis for of Rainfall Observation in the City of Mosul
- -,
In this paper, we study the statistical and chaotically analysis for the real observations represented by the observations of rainy day falling on Mosul city , diagnose its behavior using some...
Comparison Between some Methods of Tackling the Lack of Experimental Units Needed for Application of Factorial Experiments
- -,
Most of the time the researcher confronts a decrease in the experimental units required when applying a certain design, this problem appears especially when conducting the factorial experiments...
Classification of groundwater type, pilaspi quality by using Kohonen neural network
- -,
In this research, classification of(24) wells in the aquifer of water existed within the Pilaspi Geology Formation in the Bashiqa area / North of Mosul, by using one of the types of artificial...
Arabic letters recognition based on BP and perceptron and compare the performance of them
- -,
In this research we used a new method to distinguish the Arabic letter, depending on the different sizes of the Arabic letter and apply to all Arabic letters similar and dissimilar and took the...
Detecting and Administrating Hide Processes in Linux System
Rawaa Putros Qasha,
Hiding processes in Linux system is an essential part of rootkits actions and malicious program. So, it is very important to monitor and administrate the system hidden processes to ensure the...
Speaker age detection using eigen value
Khalia I. Alsaif, Hiba A. Abd alnaby,
In this research an algorithm was suggested for classifying a speaker age to two classes: (young and old classes) based on his speech signal. The suggested algorithm depend on a speech signal...
A new almost unbiased estimator in stochastic linear restriction model
Mustafa Ismaeel Naif,
In this paper, a new almost unbiased estimator is proposed under stochastic linear restrictions model as alternative to mixed estimator. The performance of the proposed estimator compared to mixed...
Modified Conjugate Gradient Algorithm with Proposed Conjugancy Coefficient
- -,
In this paper, we present modified conjugancy coefficient for the conjugate gradient method based on the (Liu and Storey) method to solve non-linear programming problems. We proved the sufficient...
Idempotent Reflexive rings whose every simle singular right module are yj-injective
- -,
In this paper we study rightidempotent reflexive ring whose simple singular right R-module isYJ-injective, we prove that this type of ring is right weakly regular ring, we show that if R is N duo...