2022-08-11T13:03:01Z
https://csm.iraqjournals.com/?_action=export&rf=summon&issue=2580
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
On intuitionistic fuzzy K-ideals of semiring
Mohammed
Jassim Mohammed
In this paper, we introduce the notion of intuitionistic fuzzy ideal and intuitionistic fuzzy K-ideal in semiring and investigate some properties of intuitionistic fuzzy K-ideals of semiring.
2009
12
28
1
8
https://csm.iraqjournals.com/article_43850_e549a201eed3cfdf43d2b0012682621a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
Intelligent Agent for PCManagr Application
Mariam
Sahee Al-Abraheemee
Software agent are a rapidly developing area of research. However, to many it is unclear what agents are and what they can (and may be cannot do).
Software agents are software entities that carry out some set of operations on behalf of a user or another program with some degree of independence or autonomy. And in so doing employ some knowledge or representation of the user's goals or desires.
We construct an intelligent agent to assist the user with personal computer management and local application activities. Two simple autonomous intelligent agents are developed, one based on a timer and another that watches the personal computer file system. When a trigger event occurs, agents can signal each other, alert the user, or execute a system command.
2009
12
28
1
17
https://csm.iraqjournals.com/article_43851_56df27015f6d56ba5f04abebe221968a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
On The λ- Choquet Integral with Respect to λ- Fuzzy Measure
Asraa
Abd Zed
We define the λ- fuzzy measure and the λ- Choquet integral for a measurable function with respect to λ- fuzzy measure. Also the relation between this integral and plausibility (belief) measure was given. In addition we explain every λ- fuzzy measure is fuzzy measure.
2009
12
28
1
7
https://csm.iraqjournals.com/article_43852_fad7c3a57d6cb8973ba7a3934c490975.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
On Convergent Filters in Bitopological Spaces
Ihsan
Jabbar Kadhim Al-Fatlawee
We study the concepts of convergence and accumulates of filters and filter bases in bitopological spaces and we study some properties of these concepts and then we find a relation between the concepts convergence and Hausdorff bitopological space.
2009
12
28
1
6
https://csm.iraqjournals.com/article_43853_5c13d551d1a2642ab91aa09f9e7bc851.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
Who creates our world and its phenomena? We have many answers for this question; the axiomatic answer, and the philosophy answer and the Qoran answer too. The aim of this paper is to proof the existence of Allah creates this world. By using the probability theorems together with previous answer.
2009
12
28
1
7
https://csm.iraqjournals.com/article_43854_34c2e45dd08965aec1c8737c0ee39bad.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
Utilizing Reverse Engineering in Tracking Software to diagnose its weaknesses
Rana
Jumaa Surayh Al-janabi
Rana
Jumaa Surayh Al-janabi
In this research, Video Cutter Software was analyzed and that software uses a well known protection method called "User Name and Registration Number". This software uses kind of complicated key generating algorithm. The analyzer hits upon the protection routine of interested software and adds suitable code to them. In other words, he discovers where in memory the entering data is stored and then to find out what is done with it. In this research, a merge technique was adopted between code injection and key generation i.e. (code is added to the execution file) in order to make the software itself browse message that contains registration number and this is in turn would consume less time than expected in analyzing (for key generation algorithm). Also, this research discusses how to support software protection by using anti-reverse engineering techniques to prevent crackers from license code stealing.
2009
12
28
1
12
https://csm.iraqjournals.com/article_43855_a71cebb1c746ad7eb8c6d6dd422d4683.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
FUGLEDE – PUTNAM THEOREM FOR CLASS OPERATORS
Shaima
Shawket Kadhim
We say that the operators A,B on a Hilbert space satisfy Fuglede – Putnam theorem if AX=XB for some X implies that . In this paper , the hypotheses on A and B can be relaxed by using a Hilbert-Schmidt operator X : Let A belong to class and let be invertible operator belong to class such that AX=XB for a Hilbert-Schmidt operator X ,then
2009
12
28
1
8
https://csm.iraqjournals.com/article_43856_6e670e8e8b06e47fd82b21f25be79a93.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
The relation between equivalent measures and the bipolar theorem
Shymaa
Farhan Muter
In this paper if we have Q and P are equivalent measures on the -field F and . We define the polar of C with respect to Q , denoted by Cْ(Q), and define bipolar Cْْْ ْ (Q)
of C with respect to Q .In this paper we study the relation between equivalent measures (p and Q) and bipolar of C. Also we prove Cْْْ ْ (Q) = Cْ ْ (P) .
2009
12
28
1
13
https://csm.iraqjournals.com/article_43857_0c9e7d4c1f32af6012739df84579ce29.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
Some Properties of Fully Semi Prime Right Rings
In this paper I shall study class of Fully Semi Prime Right Rings, and I shall give Some Properties of those Rings .
2009
12
28
1
12
https://csm.iraqjournals.com/article_43858_1a91a2a478b2c9e69d41f1b85a3f4a3f.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
Color Image Enhancement Using Histogram Modification
Ali
M. Al-Juboori
Image enhancement involves taking an image and improving it visually, typically by taking advantage of the human visual system's response. In this paper, we will enhance the color image that may be dark or light by using histogram modification such as histogram equalization, histogram stretch and histogram shrink. The objective of the histogram equalization is to map an input image to an output image such that its histogram is uniform after the mapping.
2009
12
28
1
14
https://csm.iraqjournals.com/article_43859_bceda7c6f273364ed47547d5ffcc6869.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
VIDEO COMPRESSION USING DPCM AND WT
Nora
M. Sahib
Digital images are widely used in computer applications. Uncompressed digital images require considerable storage capacity and transmission bandwidth. Efficient image compression solutions are becoming more critical with the recent growth of data intensive, multimedia-based web applications.This paper develops hybrid technique which employs combines differential pulse code modulation (DPCM) with wavelet transform. The wavelet transform is applied to the difference signal instead of direct applying it to the original images, because difference signal is almost nearly stationary. The difference signal is determined using interframe and intraframe DPCM. Intraframe method has given smoother difference signal because the frames used in the interframe prediction were not successive. The difference signal is then wavelet transformed and encoded using predictive edge detection from the LL band of the lowest resolution level to predict the edge in LH, HL and HH bands in the higher resolution levels. If the coefficient is predicted as an edge it is preserved; otherwise, it is discarded. In the decoder, the location of the preserved coefficients can also be found as in the encoder. Therefore, no overhead is needed. Instead of complex vector quantization, which is commonly used in subband image coding for high compression ratio, simple scalar quantization is used to code the remaining coefficients. A remarkable compression ratio of about 30:1 has been achieved without noticeable degradation in the decompressed images.
2009
12
28
1
11
https://csm.iraqjournals.com/article_43860_45d64b145ef14ac9e68dc1166ad51c29.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
SOME PROPERTIES OF A NEW SUBCLASS OF MEROMORPHIC UNIVALENT FUNCTIONS WITH POSITIVE COEFFICIENTS DEFINED BY RUSCHEWEYH DERIVATIVE I
Waggas
Galib Atshan
Rafid
Habib Buti
In the present paper, we have studied a new subclass of meromorephic univalent functions with positive coefficients defined by Ruscheweyh derivative in the punctured unit disk and obtain some sharp results including coefficient estimates , growth and distortion bounds and closure theorems.
Mathematics Subject Classification : 30C40
Meromorphic Univalent Function
Ruscheweyh Derivative
Distortion theorem
Extreme points
Arithmetic Mean
2009
12
28
1
10
https://csm.iraqjournals.com/article_43861_894062a1ec3ce783e5c4ba91610a0a1a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2009
1
2
SUBCLASS OF MULTIVALENT FUNCTIONS WITH NEGATIVE COEFFICIENTS DEFINED BY KOMATU OPERATOR
Waggas
Galib Atshan
ALIA
SHANI HASSAN
In this paper ,we introduce some properties of the class T ( p , A , B , , c , ) for multivalent
functions with negative coefficients defined by Komatu operator .We obtain coefficient estimates ,growth
and distortion theorem, radius of convexity for the classT ( p , A, B , , c , ) , closure theorems and con volution
property.
phrases
Komatu Operator
Coefficient Estimates
Distortion Theo rem
Radius of Convexity
Closure Theorems
Convolution Property
2009
12
28
1
9
https://csm.iraqjournals.com/article_43882_bfc482a2013b81da787304317aeab258.pdf