618 results
Search Results
102. Blind Steganalysis using One-Class Classification
- Author
-
Mohammed Karem M. and Ahmed Nori
- Subjects
steganography ,steganalysis ,blind steganalysis ,occ (one-class classification) ,python ,machin learning ,scikit-learn ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterpart, Steganalysis, which aims to suspect and analyze the transmitted media to decide wither it contain an embedded data or not which we present in a blind Steganalysis way. One-Class Classification (OCC) machine learning algorithms aim to build classification models depending on positive class only when the negative class is not available or poorly sampled. Here in this paper we depend on a one-class support vector machines (OCSVM) which has been trained on only one class of images that is clean images class, so that the trained classifier can classify new reviews to their correct class i.e. clean or stego. Training an OCC turned to be hard work and required long execution time since classifier parameters tuning, data separation and model evaluation needed to be done manually in a brute force way. A powerful programming language (Python) with the powerful machine learning library (Scikit-Learn) gave a promising classification results in deciding whether an input image is clean or stego image.
- Published
- 2019
- Full Text
- View/download PDF
103. OMU: An Ontology For Mosul University
- Author
-
Ban Mustafa and Ibrahiem Adnan
- Subjects
ontology ,owl ,university ontology ,mosul university ,protégé ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Nowadays, data from different real-time data streams are coming in. The classical relational database systems cannot manage such big data. Big data should be managed in a way that keeps the semantic relations between different concepts. Ontology is a powerful tool that comes from the concept of the semantic web, can formulate data schema as semantically connected objects. Ontology can be shared and reused across different domains and sites. In this paper, an ontology that captures the main concepts and their relationships in Mosul university is proposed. The main steps for OMU (ontology for Mosul University) development are showen using protégé ontology editor. Also, several queries are implemented to show how we can use inference engine to infer new and implicit knowledge from ontologies. visualization tools are used to visualize OMU ontology.
- Published
- 2019
- Full Text
- View/download PDF
104. 17 New Existences linear [n,3,d]19 Codes by Geometric Structure Method in PG(2,19)
- Author
-
Nada Kasm Yahya and Mustafa Salim
- Subjects
linear code ,[n ,d]q codes ,finite geometry ,(k ,r)-arc ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The purpose of this paper is to prove the existence of 17 new linear [337,3,318]19, [289,3,271]19, [266,3,249]19, [246,3,230]19, [219,3,204]19, [206,3,192]19, [181,3,168]19, [157,3,145]19, [141,3,130]19, [120,3,110]19, [112,3,103]19, [82,3,74]19, [72,3,65]19, [54,3,48]19, [37,3,32]19, [26,3,22]19, [13,3,10]19 codes by geometric structure method in PG(2,19) .
- Published
- 2019
- Full Text
- View/download PDF
105. Applying the Method of Enhancing Feedback Control On a 4D Hyperchaotic System
- Author
-
Mahasin Younis
- Subjects
dynamical systems ,hyperchaotic system ,enhancing feedback control ,control systems ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System with six cross-product nonlinearities terms, 2017], this system has three critical points employs ten terms include six quadratic cross-product nonlinearity terms, We notice that when we apply any linear control method that relies on a single unit control added to the system, the system behavior in this case cannot control it, so we applied enhancing linear feedback control at origin and we noticed that a necessary condition for suppression is getting positive feedback coefficient. Theoretical analysis and numerical simulation check the validity of the results obtained.
- Published
- 2019
- Full Text
- View/download PDF
106. New Parameter of CG-Method for Unconstrained Optimization
- Author
-
Hamsa Chilmeran, Satia Al-Taie, and Enaam Saeed
- Subjects
cg-method ,qn-direction ,global convergence ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we derived a new parameter by equating the modified QN direction which is suggested by [7] and the standard CG method which satisfied the sufficient descent condition and the global convergence under some assumptions. The numerical experiment of the new algorithm perform better than previous standard algorithm depending on the number of calling the function (NOF) and number of iterations (NOI).
- Published
- 2019
- Full Text
- View/download PDF
107. Dynamic Weights Equations for Converting Grayscale Image to RGB Image
- Author
-
Shymaa Akram Hantoush Alrubaie and Ahmed Hasan Hameed
- Subjects
ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,Fixed Weights Equations (FWE) ,Rgb image ,Computer Science::Graphics ,Computer Science::Computer Vision and Pattern Recognition ,Botany ,Computer Science::Multimedia ,lcsh:Q ,Red Green Blue color system (RGB) ,Dynamic Weights Equations (DWE) ,lcsh:L ,lcsh:Science ,Mathematics ,ComputingMethodologies_COMPUTERGRAPHICS ,lcsh:Education - Abstract
The method of converting color images from the RGB color system to grayscale images is a simple operation by using the fixed weights method of conversion, but using the same weights to restore the color of the same images is not an effective operation of all types of images because the grayscale image contains little information and it isn't worthy of conversion operation. The basic idea in this paper is to employ the mathematics equations which extracted from the grayscale image in conversion operation, this paper presents the method of coloring the grayscale image by using the weights derived from the characteristics of the grayscale image. Skewness, Mean and Standard deviation moments have been extracted from the features of grayscale images and its adoption the determine weights of the RGB color system. This method proved its success in coloring images compared to the traditional method adoption of fixed weights for coloring images because it relies on fixed weights for converting all grayscale images.
- Published
- 2018
108. المتظمبات التجريبية لمجريةا المخةمة اادجا اة المت ممة ىمحتة ا رتةض الخيالةيات اليةات تنفيحه فماً لمم اييخ ال المي. .
- Author
-
ا. د مجبل حساد عؽا
- Subjects
MIDDLE school teachers ,MATHEMATICS teachers ,PEARSON correlation (Statistics) ,FUNCTION algebras ,TRAINING needs ,PROBLEM solving ,SOCIAL choice - Abstract
Copyright of Journal of Tikrit University for Humanities is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
109. The Application of Some Linear Feedback Control Strategies on 3D Chaotic System
- Author
-
Mahasin Younis
- Subjects
chaos theory ,dynamical systems ,control systems ,ordinary feedback control ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper tackles to some linear feedback control strategies, where we take a 3D chaotic system with a five critical point of unstability, which is discovered by scientist [Zhu Congxu, 2010]. So we applied some linear feedback strategies: first strategy Ordinary Feedback Control and the second strategy Dislocate Feedback Control on this system at origin point and we noticed that a necessary condition for suppression is getting positive feedback coefficient; but this condition fails at some strategies. For this reason, we focused on these cases in our search, and design more than a strategy for studying these different situations. Theoretical analysis and numerical simulation check the validity of the results obtained.
- Published
- 2018
- Full Text
- View/download PDF
110. Comparative Studying for Opinion Mining and Sentiment Analysis Algorithms and Applications
- Author
-
Rana Alobaidy and Ghaydaa Al-Talib
- Subjects
data mining ,social media ,svm ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The amount of the available data increases the ability to analyze and understand. The internet revolution has added billions of customer’s review data in its depots. This has given an interest in sentiment analysis and opinion mining in the recent years. People have to depend on machines to classify and process the data as there are terabytes of review data in stock of a single product. So that prediction customer sentiments is very important to analyze the reviews as it not only helps in increasing profits but also goes a long way in improving and bringing out better products. In this paper , we present a survey regarding the presently available techniques and applications that appear in the field of opinion mining , such as , economy , security , marketing , spam detection , decision making , and elections expectation.
- Published
- 2018
- Full Text
- View/download PDF
111. Adaptation of a Mosquito Swarm Algorithm to Solve a Binary Knapsack Problem
- Author
-
Ruqaya Sha’ban and Isra Alkallak
- Subjects
mosquito algorithm ,knapsack problem ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper tackled one of the artificial intelligence algorithms which is Mosquito swarm algorithm as a nature inspired algorithms, to solve 0-1 knapsack an optimization problem through adaptation steps of a Mosquito swarm algorithm and the inspiration coming from the behavior of Mosquitoes, in addition to propose steps (update) for Chemical sensors, Heat sensors and location of Mosquito, to find an optimal solution in small search space and small computational requirements. A program is written in MATLAB 7.10. language to simulate this algorithm with 0-1 knapsack problem. The experimental results in this research showed effective approach, easy implementation of algorithm to find optimal solution.
- Published
- 2018
- Full Text
- View/download PDF
112. On Almost Weakly np – injective Rings
- Author
-
Raida Mahmood and Amaar Ghaze
- Subjects
np – injective ring ,reduced ,regular rings ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The ring R is called right almost weakly np –injective, if for any , there exists a positive integer n and a left ideal of R such that . In this paper, we give some characterization and properties of almost weakly np – injective rings. And we study the regularity of right almost weakly np – injective ring and in the same time, when every simple (simple singular) right R – module is almost weakly np – injective, we also give some properties of an R.
- Published
- 2018
- Full Text
- View/download PDF
113. On Annihilating - Ideal Graph of Zn
- Author
-
Husam Mohammad and Sahbaa Younus
- Subjects
annihilating – ideal graph ,zn ,hosoya polynomial ,wiener index ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we study and give some properties of annihilating-ideal graphs of Zn, also we find Hosoya polynomial and Wiener index for this graph.
- Published
- 2018
- Full Text
- View/download PDF
114. Arabic Digits Recognition by Using Unified Binary Templates in The Digital Images
- Author
-
Sundus Ebraheem
- Subjects
image processing ,arabic digits recognition ,binary templates ,arabic digits detection ,digital images ,license plate recognition ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The process of classification and recognition of the digits is very important and accurate issue, it should depend on a strong, adequate rule, because there are differences in the representation of the digits for various type of font, rather than to get homogeneous classification for group of digits to show the form or the constant shape for the digit from groups of font , where to be one shape represents each group of the shapes and sizes. This paper proposed a new method for recognition images of Arabic digits with various types and size of font which captured by various kind of camera and various resolution depending on the characteristics of each digit which extracted from study of ten types of font with various size for each type. The characteristic of all shapes and sizes extracted for each digit. Then made a constant model for each digit to be compare with the digit image in any size or font type to recognize the digit in the image. A database of ten templates (one for each digit) built, and these templates are basic and general to recognize the Arabic digits with various font and size. The new method applied for recognition of Arabic digits in the images of license plate of the passenger cars. the recognition percentage was 98%.
- Published
- 2018
- Full Text
- View/download PDF
115. Measurement Brownian Dimension of Von Koch Curve
- Author
-
Mahasin Younis
- Subjects
brownian dimension ,brownian motion ,fractal sets ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The aim of this paper, it's calculate Brownian dimension of fractal pattern has self similarity (Von Koch Curve). This method is Random Middle Third Displacement in [0,1] has Gaussian distribution. Random processes are the main focus of research by analyzing dynamical systems to determine these ‘chaotic’ systems function. One such dynamical system is Brownian Motion. Basis of current definitions of physical phenomena.
- Published
- 2018
- Full Text
- View/download PDF
116. i-Open Sets in Bitopological Spaces
- Author
-
Amir Mohammed and Sabeeh Askandar
- Subjects
i-open sets ,bitopological spaces ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we defined i-open sets and i-star generalized w-closed sets in bitopological spaces by using the definition of i-open sets in topological space (see[6]). We present some fundamental properties and relations between these classes of sets, further we give examples to explain these relations.
- Published
- 2018
- Full Text
- View/download PDF
117. The Graph of Annihilating Ideals
- Author
-
Nazar Shuker and Fryad Abdulqadir
- Subjects
annihilating ideal graph ,zero divisor graph ,reduced rings ,finite local rings ,rings integer modulo n ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Let R be a commutative ring with identity and AG(R) be the set of ideals with non-zero annihilators. The annihilating ideal graph AG(R) is a graph of vertex set AG (R){(0)} and two distinct ideal vertices I and J are adjacent if and only if . In this paper , we establish a new fundamental properties of AG(R) as well as its connection with Γ(R).
- Published
- 2018
- Full Text
- View/download PDF
118. Hosoya Polynomial and Wiener Index of Zero-Divisor Graph of Z_n
- Author
-
Husam Mohammad and Mohammad Authman
- Subjects
zero-divisor graph ,commutative rings ,hosoya polynomial and wiener index ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Let R be a commutative ring with identity. We associate a graph . In this paper, we find Hosoya polynomial and Wiener index of Zn , with n= pm or n= pmq, where p and q are distinct prime numbers and m is an integer with m 2.
- Published
- 2018
- Full Text
- View/download PDF
119. A Geometric Construction of Complete (kr ,r)-arcs in PG(2,7) and the Related projective [n,3,d]7 Codes
- Author
-
Nada Kasm Yahya
- Subjects
projective plane ,complete arcs ,codes ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
A (k ,r)-arc is a set of k points of a projective plane PG(2,q) such that some r, but no r + 1 of them, are collinear. The (k ,r)-arc is complete if it is not contained in a (k + 1,r)-arc. In this paper we give geometrical construction of complete (k r ,r)-arcs in PG(2,7), r = 2,3,…, 7, and the related projective [n,3,d]7 codes.
- Published
- 2018
- Full Text
- View/download PDF
120. On Equivalence Relation in Factor Algebras
- Author
-
Yassin A. Salih
- Subjects
Factor (chord) ,Pure mathematics ,projections ,Equivalence relation ,factor algebras ,lcsh:L ,lcsh:Science (General) ,equivalence relation ,Mathematics ,lcsh:Education ,lcsh:Q1-390 - Abstract
In this paper we introduce and study a relation “~” between projections, a relation “ ” on positive operators and a relation "~G" (G-group) on projections in extended factor algebras. The main results in this paper state that these relations are indeed an equivalence relation (Theorem 2.1) and (Theorem 2.2). Finally, we determine the relation between these concepts.
- Published
- 2013
121. فاعلية است ا رتيجية (تنبأ – لاحظ – فسر – استكشف) في التحصيل والتفكير التقييمي لدى طلاب الثاني متوسط في مادة الرياضيات.
- Author
-
ثامر, عبدالواحد حميد and سويدان, سعادة حمدي
- Published
- 2020
122. A Cognitive Semantic Analysis of Milton's 'Paradise Lost'
- Author
-
Abbas Fadhil Albayati
- Subjects
Paradise lost ,Language and Literature ,Botany ,General Medicine ,Mathematics - Abstract
Although the field of natural language processing has made considerable strides in the automated processing of standard language, the language of poetry still causes great difficulty. Normally, when we understand human language, we combine the meaning of individual words into larger units in a compositional manner. However, understanding a poem often involves an interpretive adjustment and different conceptualisation strategies of individual words. This paper aims at exploring the cognitive and semantic bases of Milton's masterpiece 'Paradise Lost' through a combination of theoretical work, corpus analysis, and experimental techniques. The paper hypothesizes that the so-called 'figures of speech' are not mere linguistic devices serving ornamental or literary purposes but correspond to mental 'figures' grounded in cognition. By locating the source of figurativeness in human cognitive make-up, recent research has decisively moved away from the idea that non-literal language constitutes a departure from a linguistic norm. A question that is not frequently addressed in the literature is the degree to which the operation of the 'poetics of mind' (Gibbs 1994) interacts with linguistic and non-linguistic knowledge, i.e. how it correlates with the semantics-pragmatics distinction. Perhaps among the most important conclusions is that the phenomena classified under each of the tropes do not necessarily constitute a natural class but form rather a continuum which cross-cuts the semantics-pragmatics borderline
- Published
- 2015
123. التقويم التشخيصي المعرفي لمستوى إتقان الطالب لمهارات الرياضيات في الصفوف الثلاثة العُليا بالمرحلة الابتدائية
- Author
-
راشد حماد الدوسري
- Abstract
Copyright of Ajman Journal of Studies & Research is the property of Association of Arab Universities and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
124. On Infinitesimal Approximation of a Continuous Function
- Author
-
Tahir H. Ismail and E Nelson
- Subjects
Transfer principle ,infinitesimal ,Pure mathematics ,convex set ,Continuous function ,Infinitesimal ,lcsh:Mathematics ,Mathematical analysis ,General Medicine ,Derivative ,Characterization (mathematics) ,lcsh:QA1-939 ,lcsh:QA75.5-76.95 ,continuous function ,Infinitesimal transformation ,Uniqueness ,lcsh:Electronic computers. Computer science ,Element (category theory) ,approximation ,Mathematics - Abstract
If P and Q are convex subsets in ) X ( C , and 0 ) x ( q > in X for all Q q ∈ . If the approximation family is the set { } Q q , P p : q p T ∈ ∈ = An Infinitesimal approximation of ) X ( C f ∈ an element in T established in [4],[5]. A characterization of an infinitesimal approximation, necessary and sufficient conditions for the unique infinitesimal approximation are obtained. 1Introduction: In this paper the problem of obtaining an infinitesimal approximation with a necessary and sufficient conditions for the uniqueness of infinitesimal approximation are considered and studied. The following definitions and statements of nonstandard analysis will be needed throughout this papers [3],[4],[6]. The axioms of IST given by Nelson E. [3] are the axioms of ZFC together with three additional axioms, which are called the transfer principle (T), the idealization principle (I), and the standardization principle (S) are stated by the following
- Published
- 2010
125. Bayesian analysis of the linear regression constraints by Gibbs sampler
- Author
-
Younis Hazim Ismail
- Subjects
Bayesian probability ,Statistics::Computation ,symbols.namesake ,ComputingMethodologies_PATTERNRECOGNITION ,Linear regression ,symbols ,linear regression ,gibbs sampler ,Applied mathematics ,bayesian analysis ,lcsh:L ,lcsh:Science (General) ,Gibbs sampling ,Mathematics ,lcsh:Education ,lcsh:Q1-390 - Abstract
In this paper we consider parameter estimation in a linear regression setting with inequality linear constraints on the regression parameters. Most other research on this topic has typically been addressed from a Bayesian perspective. In this paper we apply Bayesian approach with Gibbs sampler to generate samples from the posterior distribution. However, these implementations can often exhibit poor mixing and slow convergence. This paper overcomes these limitations with a new implementation of the Gibbs sampler. In addition, this procedure allows for the number of constraints to exceed the parameter dimension and is able to cope with equality linear constraints.
- Published
- 2010
126. Z-transform solution for nonlinear difference equations
- Author
-
Asmaa Salih Jasim and Eman Ali Hussain
- Subjects
Nonlinear system ,Science ,Mathematical analysis ,difference equations , nonlinear difference equations , z-transform ,Z-transform ,Earth-Surface Processes ,Mathematics - Abstract
The aim of this paper is to study Z-transform to solve non-linear difference equations, after converting them to linear difference equations by one of the conversion methods. This is because the z-transform cannot be directly applied to the nonlinear difference equations.
- Published
- 2021
127. w-Wiener Polynomials for Width Distance of Some Special Graphs
- Author
-
Asma Aziz and Ali Ramadan Ali
- Subjects
Combinatorics ,lcsh:Mathematics ,General Medicine ,lcsh:Electronic computers. Computer science ,width distance ,wiener index ,diameter ,lcsh:QA1-939 ,wiener polynomial ,lcsh:QA75.5-76.95 ,Mathematics - Abstract
Let G be a k0-connected graph ,and let ,,be the w- width, distance between the two vertices u,v in G. The w-Wiener polynomial of the width distance of G is defined by: Ww(G;x) is obtained in this paper for some special graphs G such as a cycle , a wheel, a theta graph , a straight hexagonal chain , and Wagner graph .The diameter with respect to the width distance – w, and the Wiener index for each such special graphs are also obtained in this paper.
- Published
- 2007
128. Three Near Points Method for Calculating Generalized Curvature and Torsion
- Author
-
Ibrahim O. Hamad and Tahir H. Ismail
- Subjects
Mathematical analysis ,Torsion (mechanics) ,three near ,torsion ,Center of curvature ,Cross product ,Curvature ,generalized curvature ,Torsion of a curve ,Point (geometry) ,lcsh:L ,lcsh:Science (General) ,Mathematics ,lcsh:Education ,lcsh:Q1-390 - Abstract
The aim of this paper is to establish a new method for calculating generalized curvature and generalized torsion. This method depends on at least three points infinitely close to the considered point. The established method is characterize from other methods by using only dot and cross product of vectors combined from this points, without any parameter that interacts in the defined curve by using some concepts of nonstandard analysis given by Robinson A. and axiomatized by Nelson E. 1- Introduction: - In this paper the problem of obtaining the generalized curvature(6), (7), and generalized torsion(8), is considered and studied by using three points infinitely close to the given point. This method is different from the two methods given in (7), (8) and (9), and it has an advantage that it does not depend on any parameter which interact with the curve.
- Published
- 2007
129. Recognition of Printed Arabic Character Using Gray- Scale Matrices
- Author
-
Hanaa F.M. Mohammad
- Subjects
Arabic ,business.industry ,Pattern recognition ,Grayscale ,language.human_language ,ocr system ,gray- scale matrices ,Character (mathematics) ,language ,printed arabic character ,Artificial intelligence ,business ,lcsh:L ,lcsh:Science (General) ,Mathematics ,lcsh:Education ,lcsh:Q1-390 - Abstract
An Optical Character Recognition (OCR) approach for printed Arabic script is presented in this paper, Which is one of the most popular scripts in the world. Development of an OCR system. For Arabic script it is difficult because Arabic characters are distinct and many structurally similar characters exist in the character set. In the proposed approach, the technique can be divided into three major steps. The first step is digitization then do some pre-processing like segmentation to detect the slant of character and correct it .Second, feature extraction , using gray-level matrices. Finally, the K-Nearest-Neighbors is used for classification. This method was tested using 45 patterns for each Arabic character with different fonts (simplified Arabic, tahoma, traditional Arabic), The sample images were divided into 20 training and 25 test images. Images in the test set did not appear in the training sets. This method performs extremely well with recognition rates .90.3%. This is a very good performance. All of this demonstrates that the new method is able to handle printed Arabic character task efficiently. It is a promising technique for recognition printed Arabic character. 1. Introduction Optical character recognition (OCR), deals with the recognition of optically processed character rather magnetically processed ones. In a typical OCR system, input characters are read and digitized by an optical scanner. Each character is then located, segmented and the resulting matrix is fed into a preprocessor. Off-line recognition can de considered the most general case: no special device is required for writing and signal interpretation is independent of signal generation, as in human recognition [6]. The recognition of Arabic character has been an area of great interest for many years, and a number of research papers and reports have already been published in this area. There are several major problems with Arabic character recognition: Arabic characters are distinct and ideographic, many structurally similar character exist in the character set Table (1). Thus, classification criteria are difficult to generate [1 J[3j[6]. The Arabic language has a rich vocabulary. More than 200 million people speak this language as their native speaking, and over 1 billion people use its character set, such as Persian and Urdu, Due to the cursive nature of the script, there are several characteristic that make recognition of Arabic distinct from the recognition of Latin script or Chinese The study of Arabic character recognition has been regarded since 1980s. However, in comparison with the other languages, such as Latin, Chinese and Japanese, there is a little work has been conducted on the automatic recognition of Arabic character [4][5].
- Published
- 2006
130. A Comparative Approach to Class Changing Derivational Affixes in English and Kurdish
- Author
-
Saza Ahmed Fakhry Abdulla and Mohsin H. S. Qadir
- Subjects
affixation ,class changing affixes ,derivation ,Social Sciences ,Grammatical category ,Verb ,multiple affixation ,Part of speech ,Linguistics ,Prefix ,Noun ,base ,Suffix ,Adjective ,Adverbial ,Mathematics - Abstract
This paper is an analytical comparative morphological study of class changing of some of derivational affixes in Standard English and Central Kurdish from the standpoints of Generative Morphology. For the analysis, this work relies heavily on the identification of various class changing affixes between the two languages under study. The main goal is to identify the points of similarity and difference of class changing affixes that change the grammatical categories and the lexical meaning of the existing lexemes. The findings show that English and Kurdish are similar in the formation of nominal and adjectival affixes where certain lexemes can change the lexical categories and the meaning of the newly derived words. In English, in the formation of verbal affixes, a ‘noun’ and an ‘adjective’ can be converted into a ‘verb’ by adding certain prefixes and suffixes. While in Kurdish, no new lexemes can be formed from the root of the verb since the internal structure of the verbs in Kurdish works differently compared to English. In Kurdish, the suffix -a is attached to some cardinal numerals to derive a new noun, whereas in English, no newly derived nouns can be formed by numerals. English and Kurdish are different in the formation of new adverbial affixes. In English, certain adjectives and nouns can derive certain types of adverbs while in Kurdish these lexical categories are unable to derive adverbs by attaching certain derivational affixes.
- Published
- 2021
131. The Formulas of Möbius-Bretschneider and Möbius-Cagnoli in the Poincaré Disc Model of Hyperbolic Geometry
- Author
-
Gülcan Balakan and Oğuzhan Demirel
- Subjects
Pure mathematics ,hyperbolic bretschneider’s formula ,Hyperbolic geometry ,Science ,symbols.namesake ,hyperbolic quadrilateral ,Poincaré conjecture ,hyperbolic cagnoli’s formula ,symbols ,Hyperbolic triangle ,hyperbolic triangle ,Earth-Surface Processes ,Mathematics - Abstract
In this paper, we present two gyroarea formulas (Möbius-Bretschneider’s formula and Möbius-Cagnoli’s formula) for Möbius gyroquadrilaterals in the Poincaré disc model of hyperbolic geometry.
- Published
- 2021
132. On П – Pure Ideals
- Author
-
Shaimaa Ahmad
- Subjects
pure ,strongly regular ,п – ring ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
As a generalization of right pure ideals, we introduce the notion of right П – pure ideals. A right ideal I of R is said to be П – pure, if for every a Î I there exists b Î I and a positive integer n such that an ≠ 0 and an b = an. In this paper, we give some characterizations and properties of П – pure ideals and it is proved that: If every principal right ideal of a ring R is П – pure then, a).L (an) = L (an+1) for every a Î R and for some positive integer n . b). R is directly finite ring. c). R is strongly П – regular ring.
- Published
- 2014
- Full Text
- View/download PDF
133. Linear Stability of Thin Liquid Films flows down on an Inclined Plane using Integral Approximation
- Author
-
Hajar Ismael
- Subjects
stability ,non-linear equations ,integral approximation ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, the stability and dynamics of a thin liquid films flowing down on an inclined plane are investigated by using integral approximation. The strong non-linear evolution equations are derived by the integral approximation with a specified velocity profile. The evolution equations are used to study the linear stability for liquid films. As a result, output of this research, we showed that the effect of inclination of films is an unstable factor.
- Published
- 2014
- Full Text
- View/download PDF
134. Detection of desert percentage in Al-Hatra Region based on image contents
- Author
-
Saja Mallaaloo and Ghaydaa Al-Talib
- Subjects
content based information retrieval ,svm ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper we benefiting from Satellite imaging to retrieve information by using its contents, which is the pixels value of the image and by using the information of groups of pixels like texture, color gradation etc….then analyzing these information to extract spatial and temporal information of this images. Content Based Information Retrieval (CBIR) technique was used to retrieve image contents depending on visual objects of it. Support Vector Machine (SVM) technique was put into use by depending on more than one function like polynomial and RBF, then applying every one of them alone with the training image with different blocks size, then using block size and function that give best result from the training phase to be applied on the test images. The Satellite imaging was classified into two areas; desert and none desert in order to find the desert percentage of each image and comparing increasing of the desert percentages in Al-Hatra Region as a typical desertification area in nenavah governorate on different temporal periods. The language used in building the system is Matlab R2011a.
- Published
- 2014
- Full Text
- View/download PDF
135. New Scaled Proposed formulas For Conjugate Gradient Methods in Unconstrained Optimization
- Author
-
Abbas Al-Bayati and Marwan Jameel
- Subjects
scaled proposed formulas ,conjugate gradient ,unconstrained optimization ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, three efficient Scaled Nonlinear Conjugate Gradient (CG) methods for solving unconstrained optimization problems are proposed. These algorithms are implemented with inexact line searches (ILS). Powell restarting criterion is applied to all these algorithms and gives dramatic saving in the computational efficiency. The global convergence results of these algorithms are established under the Strong Wolfe line search condition. Numerical results show that our proposed CG-algorithms are efficient and stationary by comparing with standard Fletcher-Reeves (FR); Polak-Ribiere (PR) CG-algorithms, using 35-nonlinear test functions.
- Published
- 2014
- Full Text
- View/download PDF
136. Stability Analysis of a fluid in Horizontal and Inclined Channels
- Author
-
Alaa Ahmed Hammodat and Taghred Shuker
- Subjects
stability ,reynold number ,wave number ,rayleigh number ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper is devoted to analysis the stability of horizontal and inclination in a glazing cavities of equations that we expose to disturbance. This analysis is done by finding the eigenvalues of the system which enable us to investigate the grow of disturbance after setting glazing cavities equations in linearization form. We obtain from our results that the equations are stable when the real part of wave velocity is negative , and unstable when it is positive .
- Published
- 2014
- Full Text
- View/download PDF
137. A Comparative Study of Wavelets Methods for Solving Non-Linear Two-Dimensional Boussinesq System of Type BBM-BBM
- Author
-
Ekhlass Al-Rawi and Ahmed Qasim
- Subjects
boussinesq systems ,bbm-bbm system ,haar wavelets ,legendre wavelets ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, numerical techniques based on the wavelets methods are proposed for the numerical solution of non-linear two-dimensional BBM-BBM system and we compared between them. Two methods used in numerical solutions, are the Haar wavelets and Legendre wavelets methods.In addition, we derived formulas of integrals for Legendre wavelets analytically. Its efficiency is tested by solving an example for which the exact solution is known. The accuracy of the numerical solutions is quite high even if the number of calculation points is small, by increasing the number of collocation points, the error of the solution rapidly decreases. We have found that the Legendre wavelets method is better and closer to the exact solution than the Haar wavelets method.
- Published
- 2014
- Full Text
- View/download PDF
138. Numerical Solution of Allen – Cahn Equation by Adomian Decomposition Method
- Author
-
Abdulghafor Al-Rozbayani
- Subjects
allen – cahn (ac) equation ,adomian decomposition method (adm) ,dufort-frankel method (dfm) ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, Adomian Decomposition Method with Adomian polynomials are applied to solve Allen - Cahn equation with the initial condition only, also DuFort-Frankel method is applied with the initial and boundary conditions. The numerical results that are obtained by the Adomian decomposition method have been compared with the exact solution of the equation shown that it is more efficient than the DuFort-Frankel method, that is illustrated through the tables and Figures.
- Published
- 2014
- Full Text
- View/download PDF
139. On SNF-rings , I
- Author
-
Raida Mahmood and Akram M.
- Subjects
snf-rings ,gw-ideal ,reversible ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
A ring is called right SNF-rings if every simple right R-module is N-flat . In this paper , we give some conditions which are sufficient or equivalent for a right SNF-ring to be n-regular (reduced) .It is shown that 1- If is a GW-ideal of R for every . then ,is reduced if and only if is right SNF-ring. 2- If is an reversible, then is regular if and only if is right GQ-injective and SSNF-ring .
- Published
- 2014
- Full Text
- View/download PDF
140. A Modified Class of Conjugate Gradient Algorithms Based on Quadratic Model for Nonlinear Unconstrained Optimization
- Author
-
Basim Hassan and Hameed Sadiq
- Subjects
conjugate gradient ,quadratic model ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we have investigated a new class of conjugate gradient algorithms for unconstrained non-linear optimization which are based on the quadratic model. Some theoretical results are investigated which are sufficient descent and ensure the local convergence of the new proposed algorithms. Numerical results show that the proposed algorithms are effective by comparing with the Polak and Ribiere algorithm.
- Published
- 2014
- Full Text
- View/download PDF
141. Application of Chaotic Neural Network for Authentication using the Database
- Author
-
Ammar Yaseen Abd Alazeez
- Subjects
neural network ,security ,database ,authentication ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding by entering values to the artificial neural network for training as well as hide in the picture, beside use the database for storage and retrieval information and increase the secret system. Through the overlap between the results of stages encryption and hide and artificial neural network algorithm was obtained exciting new strength from where you can not detect secret text only after obtaining random values of the chaotic algorithm and information about neural network algorithm as well as algorithm of work.
- Published
- 2014
- Full Text
- View/download PDF
142. Classification of Zero Divisor Graphs of Commutative Rings of Degrees 11,12 and 13
- Author
-
Nazar Shuker and Husam Mohammad
- Subjects
zero-divisor ,ring ,zero-divisor graph ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In 2005 Wang investigated the zero divisor graphs of degrees 5,6,9 and 10. In 2012 Shuker and Mohammad investigated the zero divisor graphs of degrees 7 and 8. In this paper, we consider zero divisor graphs of commutative rings of degrees 11, 12 and 13.
- Published
- 2014
- Full Text
- View/download PDF
143. Studying the Stability of a Non-linear Autoregressive Model (Polynomial with Hyperbolic Cosine Function)
- Author
-
Abdulghafoor Salim and Anas Youns Abdullah
- Subjects
non-linear time series model ,non-linear random vibration ,autoregressive model ,limit cycle ,singular point ,stability ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper we study the statistical properties of one of a non-linear autoregressive model with hyperbolic triangle function(polynomial with hyperbolic cosinefunction)by using the local linearization approximation method to find the stability of the model (singular point and its stability conditions and the stability of limit cycle).Where we started by the model of lower order (first and second and third order) and generalized the idea, and we tried to apply these theory results by using some of examples to explain one of important truth that says (if the model has unstable singular point, then it, maybe, has a stable limit cycle).
- Published
- 2014
- Full Text
- View/download PDF
144. On Local Rings
- Author
-
Zubayda Ibraheem and Anees Fthee
- Subjects
local ,von neumann regular and strongly regular rings ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
A ring R is called local ring if it has exactly one maximal ideal. In this paper, we introduce some characterization and basic properties of this ring. Also, we studied the relation between local rings and Von Neumann regular rings and strongly regular rings.
- Published
- 2014
- Full Text
- View/download PDF
145. Conjugate Gradient Algorithm Based on Aitken's Process for Training Neural Networks
- Author
-
Khalil Abbo and Hind Mohammed
- Subjects
artificial neural front networks ,education algorithms ,aitken method ,conjugate gradient algorithms ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Conjugate gradient methods constitute excellent neural network training methods, because of their simplicity, numerical efficiency and their very low memory requirements. It is well-known that the procedure of training a neural network is highly consistent with unconstrained optimization theory and many attempts have been made to speed up this process. In particular, various algorithms motivated from numerical optimization theory have been applied for accelerating neural network training. In this paper, we propose a conjugate gradient neural network training algorithm by using Aitken's process which guarantees sufficient descent with Wolfe line search. Moreover, we establish that our proposed method is globally convergent for general functions under the strong Wolfe conditions. In the experimental results, we compared the behavior of our proposed method(NACG) with well- known methods in this field.
- Published
- 2014
- Full Text
- View/download PDF
146. Certain Subclasses of Meromorphic Univalent Function Involving Differential Operator
- Author
-
Abdul Rahman S. Juma and Teba Rzaij Al-Kubaisi
- Subjects
meromorphic univalent function ,differential operator,hadamard product, starlike function,convex function,neighborhood ,Pure mathematics ,Mathematics::Complex Variables ,Differential operator ,Convexity ,Convolution ,Distortion (mathematics) ,Hadamard product ,lcsh:Q ,Convex function ,lcsh:Science ,Earth-Surface Processes ,Univalent function ,Mathematics ,Meromorphic function - Abstract
The main object of the present paper is to introduce the class of meromorphic univalent function K* (σ,τ,S) defined by differential operator with study some geometric properties like coefficient inequality , growth theorem and distortion theorem, radii of starlikeness and convexity of f(z) in the class K* (σ,τ,S) .Also the concept of convolution (Hadamard product) investigate and Neighborhoods of the elements of class K* (σ,τ,S) are obtained.
- Published
- 2020
147. On Some Results in Fuzzy Length Space
- Author
-
Raghad I. Sabri, Mayada Nazar, and Mohammed Ali
- Subjects
Pure mathematics ,Mathematics::General Mathematics ,Cartesian product ,fuzzy length space, fuzzy point, sequentially fuzzy compact fuzzy length space, countably fuzzy compact fuzzy length space, locally fuzzy compact fuzzy length space ,Space (mathematics) ,Fuzzy logic ,symbols.namesake ,ComputingMethodologies_PATTERNRECOGNITION ,symbols ,lcsh:Q ,ComputingMethodologies_GENERAL ,lcsh:Science ,Earth-Surface Processes ,Mathematics - Abstract
In this paper, depending on the notion of fuzzy length space we define the Cartesian product of two fuzzy length spaces. we proved that the Cartesian product of two fuzzy length spaces is a fuzzy length space. More accurately, the Cartesian product of two complete fuzzy length spaces is proved to be a complete fuzzy length space. Furthermore, the definitions of sequentially fuzzy compact fuzzy length space, countably fuzzy compact fuzzy length space, locally fuzzy compact fuzzy length space are introduced, and theorems related to them are proved.
- Published
- 2020
148. Weight Distribution of Some Codewords of 3-ary Linear Code over GF(27)
- Author
-
Emad Bakr Al-Zangana and Maha Majeed Ibrahim
- Subjects
Combinatorics ,Weight distribution ,Structure (category theory) ,Incidence matrix ,lcsh:Q ,Generator matrix ,finite projective space, incidence matrix, linear code, weight distribution. ,lcsh:Science ,Linear code ,Prime (order theory) ,Earth-Surface Processes ,Mathematics - Abstract
This paper is devoted to introduce the structure of the p-ary linear codes C(n,q) of points and lines of PG(n,q),q=p^h prime. When p=3, the linear code C(2,27) is given with its generator matrix and also, some of weight distributions are calculated.
- Published
- 2020
149. Solving Whitham-Broer-Kaup-Like Equations Numerically by using Hybrid Differential Transform Method and Finite Differences Method
- Author
-
Abdulghafor M. Al-Rozbayani and Zeena M. Al-Botani
- Subjects
Differential transform method ,General Computer Science ,General Mathematics ,Science ,Differential Transform Method, Finite Differences Method, Hybrid Differential Transform - Finite Differences Method, Whitham-Broer-Kaup-Like Equations ,Finite difference ,General Physics and Astronomy ,Applied mathematics ,General Chemistry ,Agricultural and Biological Sciences (miscellaneous) ,General Biochemistry, Genetics and Molecular Biology ,Mathematics - Abstract
This paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.
- Published
- 2022
150. Application of Groebner Bases to Study a Communication System
- Author
-
Alaa Jony and Shawki Al-Rashed
- Subjects
General Computer Science ,General Mathematics ,Science ,Botany ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,General Physics and Astronomy ,General Chemistry ,Agricultural and Biological Sciences (miscellaneous) ,General Biochemistry, Genetics and Molecular Biology ,Mathematics ,Groebner bases, Network Coding, Resultant - Abstract
This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.
- Published
- 2022
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.