Volume 11 Issue 2

Published: 2011-12-01

Contents


Article
Transformation Linear Membership Function by Using the Modified S- Curve

Abdul Rahim K.Rahi and Shorish Omer Abdulla

In this paper, we concentrate on two cases of fuzzy linear programming problems (FLPP): LPP with coefficient of objective function and coefficient of available resources and constraint are...

DOI: 10.33899/iqjoss.2011.027635

Pages: 1-25
Spotlights on Chaos Theory Basil Younis Thanoon

د. باسل يونس ذنون الخياط

This paper sheds light on the theory of chaos, which is one of the latest mathematical theories. Some aspects of the scientific, applied and philosophical fields related to this theory are studied,...

DOI: 10.33899/iqjoss.2011.027579

Pages: 1-18
A new almost unbiased estimator in stochastic linear restriction model

Mustafa Ismaeel Naif

In this paper, a new almost unbiased estimator is proposed under stochastic linear restrictions model as alternative to mixed estimator. The performance of the proposed estimator compared to mixed...

DOI: 10.33899/iqjoss.2011.027636

Pages: 26-34
Multi-Objective GPP with General Negative Degree of Difficulty: New Insights

Abbas Y. Al-Bayati, Huda E. Khalid

The methods for solving nonlinear multi-objective optimization are divided into three major categories: methods with apriori articulation of preferences, methods with a posteriori articulation of...

DOI: 10.33899/iqjoss.2011.027862

Pages: 35-51
Reliability of Acceptance Sampling Plans for Gamma-Distribution Life Times Under Hybrid Censoring Scheme

لمياء محمد علي حميد

This paper deals with Reliability of Acceptance Sampling Plan (RASP) which differs from ordinary sampling plan for a static quality characteristic,since it involves a non-normal fail time...

DOI: 10.33899/iqjoss.2011.027594

Pages: 38-46
A study of the stability of an amplitude-dependent exponential autoregressive model with application

Abdul Ghafoor Jasim Salim, Kaies Esmaeel, Haneen Talal Jasim

In this paper we studied and found the stability conditions of the (AEXPAR) model by using a dynamical approach and by adopting the linear approximation technique.

DOI: 10.33899/iqjoss.2011.027863

Pages: 52-62
Statistical and Chaotic Analysis for of Rainfall Observation in the City of Mosul

ميسون مال الله عزيز

In this paper, we study the statistical and chaotically analysis for the real observations represented by the observations of rainy day falling on Mosul city , diagnose its behavior using some...

DOI: 10.33899/iqjoss.2011.027598

Pages: 61-79
Characterizing Internal and External Sets

Tahir H. Ismail and and, Hind Y. Saleh, Barah M. Sulaiman

The aim of this paper is to give a characterization between the external and internal sets, and some relation between the galaxies and monads, according to this paper we obtain the following...

DOI: 10.33899/iqjoss.2011.027865

Pages: 63-69
Numerical Solution of Coupled-BBM Systems of Boussinesq type by Implicit Finite Difference Method

Ekhlass S. Al-Rawi, Muhannad A. Mahmoud

In this paper we study a numerical solution of coupled BBM systems of Boussinesq type, which describes approximately the two ways propagation of surface wave in a uniform horizontal channel of...

DOI: 10.33899/iqjoss.2011.027872

Pages: 70-82
Building and Studying some models of State Space of Brain waves Frequency to identify the reasons of pilepsy

د. افتخار عبد الحميد النقاش

The research objective adoption idea came to build and study the state space models to identify the reasons of epilepsy on basis of the brain waves frequency, where two models have been built, the...

DOI: 10.33899/iqjoss.2011.027602

Pages: 80-103
Rate of Convergence for a New Family of Summation-Integral Beta Operators

Ali J. Mohammad and Ansam A. Abdul-Rahman

In the present paper, we define a new family of summation-integral Beta operators to approximate a class of unbounded continuous functions of polynomial growth , for some and then we estimate the...

DOI: 10.33899/iqjoss.2011.027876

Pages: 83-92
Numerical Solution for Non-linear Korteweg-de Vries-Burger's Equation Using the Haar Wavelet Method

اخلاص سعد الله

In this paper, an operational matrix of integrations based on the Haar wavelet method is applied for finding numerical solution of non-linear third-order korteweg-de Vries-Burger's equation, we...

DOI: 10.33899/iqjoss.2011.027877

Pages: 93-110
Superiority of the MCRR Estimator Over Some Estimators In A Linear Model

Feras Sh. M. Batah

Modied (r, k) class ridge regression (MCRR) which includes unbiased ridge regression (URR), (r, k) class, principal components regression (PCR) and the ordinary least squares (OLS) estimators is...

DOI: 10.33899/iqjoss.2011.027881

Pages: 111-116
ON MULTIVALENT HARMONIC MEROMORPHIC FUNCTIONS INVOLVING HYPERGEOMETRIC FUNCTIONS

ABDULRAHMAN SALMAN JUMA

In this paper we introduce a subclass of multivalent harmonic meromorphic functions defined in the exterior of the unit disk by using generalize hypergeometric functions. We derived sufficient...

DOI: 10.33899/iqjoss.2011.027883

Pages: 117-126
Exact Solutions for Some Partial Differential Equations by Using First Integral Method

فائزة لفته حسن القطراني

In this paper, some exact solutions for the convectiondiffusionreaction equation in two dimensions and a nonlinear system of partial differential equations are formally derived by using the first...

DOI: 10.33899/iqjoss.2011.027886

Pages: 127-145
Idempotent Reflexive rings whose every simle singular right module are yj-injective

محمد ذنون يونس النعيمي

In this paper we study rightidempotent reflexive ring whose simple singular right R-module isYJ-injective, we prove that this type of ring is right weakly regular ring, we show that if R is N duo...

DOI: 10.33899/iqjoss.2011.027891

Pages: 146-154
A Spectral Conjugate Gradient Method with Inexact line searches

Abbas Y. Al-Bayati, Basim A. Hassan

In this paper, a new Spectral Conjugate Gradient (SCG) method for solving unconstrained optimization problems; based on inexact line searches is investigated. The search directions of the new CG...

DOI: 10.33899/iqjoss.2011.027895

Pages: 155-163
Comparison Between some Methods of Tackling the Lack of Experimental Units Needed for Application of Factorial Experiments

مروان عبد العزيز دبدوب

Most of the time the researcher confronts a decrease in the experimental units required when applying a certain design, this problem appears especially when conducting the factorial experiments...

DOI: 10.33899/iqjoss.2011.027612

Pages: 163-183
Conjugate Gradient Back-propagation with Modified Polack –Rebier updates for training feed forward neural network

Abbas Al-Bayati, Ibrahem A. Saleh, Khalil K. Abbo

Several learning algorithms for feed-forward (FFN) neural networks have been developed, many of these algorithms are based on the gradient descent algorithm well-known in optimization theory which...

DOI: 10.33899/iqjoss.2011.027897

Pages: 164-173
A New Extended PR Conjugate Gradient Method for Solving Smooth Minimization Problems

Abbas Y. AL-Bayati, Rana Z. AL-Kawaz

In this paper, we have discussed and investigated an extended PR-CG method which uses function and gradient values. The new method involves the extended CG-methods and have the sufficient descent...

DOI: 10.33899/iqjoss.2011.027900

Pages: 174-191
A Comparison between some Statistical Analyses in a Study of the Power of pH and the Concentration of CO2 in Tigris River Through Mosul City

مروان عبد العزيز دبدوب

Al-Sanjary (2001) mentioned the values of mean and standard deviation of the power of hydrogen (pH) and concentration of carbon dioxide (CO2) in the water of Tigris river in Mosul city, the study...

DOI: 10.33899/iqjoss.2011.027613

Pages: 184-203
A New Type of Conjugate Gradient Method with a Sufficient Descent Property

Abbas Y. Al-Bayati, Basim A. Hassan

This paper presents the development and implementation of a new unconstrained optimization method; based on the inexact line searches. Our new proposed Conjugate Gradient (CG) method always...

DOI: 10.33899/iqjoss.2011.027903

Pages: 192-201
Modified Conjugate Gradient Algorithm with Proposed Conjugancy Coefficient

عبد الغفور جاسم سالم

In this paper, we present modified conjugancy coefficient for the conjugate gradient method based on the (Liu and Storey) method to solve non-linear programming problems. We proved the sufficient...

DOI: 10.33899/iqjoss.2011.027904

Pages: 202-213
Recognition of Warping Face Image and Morphing Face Image of Two Warping Image Using Hidden Markov Model

بان أحمد حسن متراس

In this paper, using algorithm models of Hidden Markov models, it has been concluded that the possibility of recognizing the warp face and the morph face the image real departments face on...

DOI: 10.33899/iqjoss.2011.027614

Pages: 204-221
The spectral form of the Dai-Yuan conjugate gradient algorithm

Abdul-Ghafoor J. Salem, Khalil K. Abbo

Conjugate Gradient (CG) methods comprise a class of unconstrained optimization algorithms which are characterized by low memory requirements and strong local and global convergence properties. Most...

DOI: 10.33899/iqjoss.2011.027906

Pages: 214-221
A descent modified Hager-Zhang conjugate gradient method and its global convergence

Ghada M. Al-Naemi, Huda I. Ahmed

In this paper, based on the memoryless BFGS quasi-Newton method, we propose a new modified Hager-Zhang (HZ) type method. An attractive property of the proposed method is that the direction...

DOI: 10.33899/iqjoss.2011.027909

Pages: 222-236
Prediction by Regression and kriging for Spatial Data with Application

محمد نذير اسماعيل قاسم

This study deals with the prediction of the non-stationary spatial stochastic process. The prediction is done by two techniques which are regression technique (generalized least square estimation)...

DOI: 10.33899/iqjoss.2011.027617

Pages: 222-237
Scaled Fletcher-Revees Method for Training Feed forward Neural Network

Basher M. Khalaf, Khalil K. Abbo

The training phase of a Back-Propagation (BP) network is an unconstrained optimization problem. The goal of the training is to search an optimal set of connection weights in the manner that the...

DOI: 10.33899/iqjoss.2011.027912

Pages: 237-245
Constructing χ2 Chart by Using Bayesian Approach with Application

ريا سالم الرسام

In this study, new charts were formed using Baysian technique and they were called Baysian chart (2B) , to control the average . The control chart (2B) was used and the process includes real data...

DOI: 10.33899/iqjoss.2011.027619

Pages: 238-261
A Modified Conjugate Gradient Method using multi-step in Unconstrained Optimization

هدى عصام احمد

In this paper we proposed a new HS type conjugate gradient method by using two kind of modification, first derived a new non-quadratic model second using structure of the memoryless BFGS...

DOI: 10.33899/iqjoss.2011.027917

Pages: 246-258
Palmprint Recognition Using Contourlet Feature Extraction and Backpropagation Neural Network Classifier

laheeb M. Alzoubiady, Ibrahim A. Saleh

Palm print biometrics technology is highest used for human identity verification in most of security application. In this research the automated biometric system based palmprint biometric technique...

DOI: 10.33899/iqjoss.2011.027921

Pages: 259-270
Non-Linear Dynamic Modelling and Morecasting in Numbers of Patients with Cancer Disease in Nineveh City by Using Bayesian Approach

ريا سالم الرسام

This research deals with modeling cumulative number of patients with cancer disease in Nineveh Iraq. The method is based on classes of Exponential Growth Models and uses the ideas of Non-Linear...

DOI: 10.33899/iqjoss.2011.027621

Pages: 262-286
Speaker age detection using eigen value

Khalia I. Alsaif, Hiba A. Abd alnaby

In this research an algorithm was suggested for classifying a speaker age to two classes: (young and old classes) based on his speech signal. The suggested algorithm depend on a speech signal...

DOI: 10.33899/iqjoss.2011.027924

Pages: 271-290
Around the Probability Distribution of The Estimated Random Ridge Factor with Stochastic Prior Information

هيفاء عبد الجواد سعيد

In this paper, The probability distribution of the estimated stochastic ridge factor has been found, which has been developed by adding prior information to the sample information. These...

DOI: 10.33899/iqjoss.2011.027623

Pages: 287-296
Sound Encryption Using Feature Extraction and Neural Network

Alyaa Moufaq, Melad Jader, Ielaf O. Abdul-Majjed

In recent years, secure communication techniques have increased widely and unexpectedly . In order to establish reliable communication technology and to ensure that the data (sound) reaches its...

DOI: 10.33899/iqjoss.2011.027926

Pages: 291-308
Estimation and Structure of Bayesian Tests for the Scale and Loction Parameters in Multivaiate- t distrbution

هيفاء عبد الجواد سعيد

This paper deals with two problems Bayesian estimation and hypothesis tests to the parameters of Multivaiate- t distrbution when the degrees of freedom of distribution is known with the...

DOI: 10.33899/iqjoss.2011.027625

Pages: 297-314
Speech compression based on wavelet and contourlet Transformation

Khalil I. Alsaif, Hadia Salih Albadrani

Speech compression is very important in many applications. In this research we applied compression on speech by using wavelet transform and contourlet transform. By taking speech (which is often...

DOI: 10.33899/iqjoss.2011.027927

Pages: 309-320
Comparison between the method of Fuzzy Control and Discriminate Function in the classification of some wells Nineveh

مثنى صبحي سليمان

In this study, the construction of a Fuzzy Inference Control to determine the validity of the quality of ground water wells of some of Nineveh province, through a series of observations that were...

DOI: 10.33899/iqjoss.2011.027628

Pages: 315-330
Detecting and Administrating Hide Processes in Linux System

Rawaa Putros Qasha

Hiding processes in Linux system is an essential part of rootkits actions and malicious program. So, it is very important to monitor and administrate the system hidden processes to ensure the...

DOI: 10.33899/iqjoss.2011.027958

Pages: 321-335
Estimation of Multiple Logistic Model by Using Empirical Bayes Weights and Comparing it with the Classical Method with Application

طه حسين علي

In this research, a solution of heteroscedastisity of the random error variance is found in the Multiple Logistic Model when the response variable (dependent) variable is Qualitative by using the...

DOI: 10.33899/iqjoss.2011.027630

Pages: 331-348
Face Detection Using Neural Networks

Ramadan M. Ramo, Fawziya M. Ramo

This research detects the existence of the face in the digital images by using an Elman network, after a number of stages where at first it converts the image to the gray level and then...

DOI: 10.33899/iqjoss.2011.027960

Pages: 336-350
Digital Image Watermarking Algorithm in Discrete Wavelet Transform Domain Using HVS Characteristics

Nasseer Moyasser Basheer, Shaimaa Salah Abdulsalam

Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. Watermarking is identified as a major means to achieve copyright...

DOI: 10.33899/iqjoss.2011.027962

Pages: 351-368
A New Suggested Method for the Selection of Best Regression Equation Depending on the Partial Correlation coefficient

غزوان هاني محمود

This research suggested a new heuristic method to select the best regression equation. Assuming that we have a set of predictor variables. The choice of some of those variables is required to...

DOI: 10.33899/iqjoss.2011.027632

Pages: 362-372
Self-tuning PID Controller using Genetic Algorithm

Abdul-Kareem Z. Mansoor, Thair A. Salih, Mohamed Y. Hazim

This work presents design, modeling, simulation and hardware implementation of a separately excited DC motor speed control using Field Programmable Analog Array (FPAA) Technology. The framework...

DOI: 10.33899/iqjoss.2011.027964

Pages: 369-385
Simulation TMJ clinic by Using Intelligence Techniques

Anhar Khairy Al-Deen, Reem Ali Al-Jarah, Baseer Ali Abd Allah

The research aims is structuring the TMJ clinic; it is a computerized system that diagnoses and treats the clinical cases through a computing statistical basis for the serious cases.This system...

DOI: 10.33899/iqjoss.2011.027965

Pages: 386-403
A Study of the stability for one of non-linear autoregressive models with trigonometric terms with application

عبد الغفور جاسم سالم

In this paper we study the stability of one of non-linear autoregressive models with trigonometric terms , by using the linear approximation technique . From this method the singular point and the...

DOI: 10.33899/iqjoss.2011.027640

Pages: 410-432
Thin films flow by inertia forces

خضر محمد صالح خضر

In this paper we consider the motion in thin liquid films of a rectilinear flow by inertia force and there is a balance of pressure gradient, viscous and surface tension.Navier stokes equations...

DOI: 10.33899/iqjoss.2011.027642

Pages: 433-442
An approximate Solution of Heat Equation in Three Dimensions by LOD Method

عبد الغفور محمد أمين

In this paper, we solve one of the parabolic partial differential equations in three dimensions which is heat equation with Locally One Dimension methods, and by comparing the results by this...

DOI: 10.33899/iqjoss.2011.027643

Pages: 443-478
Adomian Decomposition Method for Solving Parabolic Partial Differential Equations in Three Dimensions

عبد الغفور محمد امين

In this paper, we use the approximate solution of linear partial differential equations in three dimensions of the parabolic type by using Adomian Decomposition Method (ADM). Comparing the...

DOI: 10.33899/iqjoss.2011.027644

Pages: 479-496
Stability Analysis of the Flow of Aqueous Humor in the Posterior Chamber to the Human Eye.

أشرف سمعان مسكوني

This paper is devoted to analyze the stability of the flow of a aqueous humor in posterior chamber of the human eye. This analysis is done by finding the eigenvalues of the system which enable us...

DOI: 10.33899/iqjoss.2011.027645

Pages: 497-515
Stability Analysis of the Evaporation of a Tear Film over a Contact Lens

رتينة جاسم العطيوي

The aim of this paper is to analyes the stability of a system of flow and evaporation liquid of tear film throw the pre-lens tear film (PrLTF) of contact lens in eye porous layer which infected by...

DOI: 10.33899/iqjoss.2011.027646

Pages: 516-528
A Fuzzy Computer System for the Classification of Medical Conditions

باسل يونس الخياط

This research deals with the actual medical data including a number of variables such as Systolic Blood Pressure (SBP) Total Cholesterol (TC) and high density lipoprotein .a computer system is...

DOI: 10.33899/iqjoss.2011.027647

Pages: 529-541
Multi-Periods Dynamic Inventory Model

احمد محمود السبعاوي

In this paper the probabilistic multi-item inventory model is derived when the holding cost is a function of the order quantity, and restricted by a non-linear restriction imposed on this cost. The...

DOI: 10.33899/iqjoss.2011.027806

Pages: 542-552
Finding Optimal Strategy for Static Games by Using Genetic Algorithm

بان احمد حسن متراس

In this paper, one of the artificial intelligence algorithms was used, which is the genetic algorithm that is based on the application of innovative concepts including selection, crossover and...

DOI: 10.33899/iqjoss.2011.027808

Pages: 553-569
A Constrained Probabilistic Multi-Item Inventory Model

احمد محمود السبعاوي

In this paper the probabilistic multi-item inventory model is derived when the holding cost is a function of the order quantity, and restricted by a non-linear restriction imposed on this cost. The...

DOI: 10.33899/iqjoss.2011.027815

Pages: 570-588
Classification of groundwater type, pilaspi quality by using Kohonen neural network

حذيفة حازم طه

In this research, classification of(24) wells in the aquifer of water existed within the Pilaspi Geology Formation in the Bashiqa area / North of Mosul, by using one of the types of artificial...

DOI: 10.33899/iqjoss.2011.027817

Pages: 589-611
A proposed algorithm based on linear programming approach for three-stage three jobs flow shop scheduling with criteria : minimize makespan

مناف حازم احمد

This research has proposed an algorithm to find the optimal schedule for three jobs in flow shop environment with three stages , so that the makespan is less than what can be.This algorithm is...

DOI: 10.33899/iqjoss.2011.027819

Pages: 612-625
Optimal 2D Boards Cutting Using Genetic Algorithm

سماء طليع عزيز

According to the development in computing industries and production Management ,in this research we focus on the design and application of of the main stages of production , a phase of cutting the...

DOI: 10.33899/iqjoss.2011.027821

Pages: 626-641
An Optimized Genetic Algorithm-based Approach for Steganography

همسة معن محمد

In this paper, a new steganographic technique was proposed. First, the cover colored image (of type BMP, PNG) transfered to a gray image, then the result divided into many blocks to embed the...

DOI: 10.33899/iqjoss.2011.027823

Pages: 642-657
Comparison among information hiding methods in DNA Sequences

احمد سامي نوري

By research, three methods for hiding secret message were proposed. In the first one the secret message was hid in a known DNA sequence belongs to prokaryotic organism Escherichia Coli k12 (E.Coli...

DOI: 10.33899/iqjoss.2011.027826

Pages: 658-674
Recognition using Chain Code

سندس خليل إبراهيم

The process of recognizing the processed patterns makes the pattern data useful for the computer. It plays a significant role in the field of pattern recognition and computer vision. So, the image...

DOI: 10.33899/iqjoss.2011.027842

Pages: 691-713
Design and implementation of the hybrid system for encryption and hiding the text file in the Voice over Internet Protocols.

منار يونس كشمولة

The immense development in the communication network has opened new spheres that threaten the data security transferred via the communication networks. As a consequence the techniques of encryption...

DOI: 10.33899/iqjoss.2011.027844

Pages: 714-729
Arabic letters recognition based on BP and perceptron and compare the performance of them

غادة ذنون طليع

In this research we used a new method to distinguish the Arabic letter, depending on the different sizes of the Arabic letter and apply to all Arabic letters similar and dissimilar and took the...

DOI: 10.33899/iqjoss.2011.027851

Pages: 730-749
Developing an Advertisement System for Colleges

عمر عبد المنعم الدباغ

Departments colleges suffer from the problems that exist in the system of traditional advertising based primarily on the use of bulletin boards and the manner in which the paper is characterized by...

DOI: 10.33899/iqjoss.2011.027853

Pages: 750-760
Hiding Text Data in Karhunen Loeve Space by Using a Random Formula in Digital Images

سندس خليل إبراهيم

The increasing growth of the multimedia on the network led to increasing the need to offer efficient methods to protect data and the individual property. The aim of hiding the information is to...

DOI: 10.33899/iqjoss.2011.027860

Pages: 786-800