Volume 1, Issue 2, Autumn 2009, Page 1-9


On intuitionistic fuzzy K-ideals of semiring

Mohammed Jassim Mohammed

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-8

In this paper, we introduce the notion of intuitionistic fuzzy ideal and intuitionistic fuzzy K-ideal in semiring and investigate some properties of intuitionistic fuzzy K-ideals of semiring.

Intelligent Agent for PCManagr Application

Mariam Sahee Al-Abraheemee

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-17

Software agent are a rapidly developing area of research. However, to many it is unclear what agents are and what they can (and may be cannot do).
Software agents are software entities that carry out some set of operations on behalf of a user or another program with some degree of independence or autonomy. And in so doing employ some knowledge or representation of the user's goals or desires.
We construct an intelligent agent to assist the user with personal computer management and local application activities. Two simple autonomous intelligent agents are developed, one based on a timer and another that watches the personal computer file system. When a trigger event occurs, agents can signal each other, alert the user, or execute a system command.

On The λ- Choquet Integral with Respect to λ- Fuzzy Measure

Asraa Abd Zed

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-7

We define the λ- fuzzy measure and the λ- Choquet integral for a measurable function with respect to λ- fuzzy measure. Also the relation between this integral and plausibility (belief) measure was given. In addition we explain every λ- fuzzy measure is fuzzy measure.

On Convergent Filters in Bitopological Spaces

Ihsan Jabbar Kadhim Al-Fatlawee

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-6

We study the concepts of convergence and accumulates of filters and filter bases in bitopological spaces and we study some properties of these concepts and then we find a relation between the concepts convergence and Hausdorff bitopological space.

Utilizing Reverse Engineering in Tracking Software to diagnose its weaknesses

Rana Jumaa Surayh Al-janabi; Rana Jumaa Surayh Al-janabi

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-12

In this research, Video Cutter Software was analyzed and that software uses a well known protection method called "User Name and Registration Number". This software uses kind of complicated key generating algorithm. The analyzer hits upon the protection routine of interested software and adds suitable code to them. In other words, he discovers where in memory the entering data is stored and then to find out what is done with it. In this research, a merge technique was adopted between code injection and key generation i.e. (code is added to the execution file) in order to make the software itself browse message that contains registration number and this is in turn would consume less time than expected in analyzing (for key generation algorithm). Also, this research discusses how to support software protection by using anti-reverse engineering techniques to prevent crackers from license code stealing.

FUGLEDE – PUTNAM THEOREM FOR CLASS OPERATORS

Shaima Shawket Kadhim

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-8

We say that the operators A,B on a Hilbert space satisfy Fuglede – Putnam theorem if AX=XB for some X implies that . In this paper , the hypotheses on A and B can be relaxed by using a Hilbert-Schmidt operator X : Let A belong to class and let be invertible operator belong to class such that AX=XB for a Hilbert-Schmidt operator X ,then

The relation between equivalent measures and the bipolar theorem

Shymaa Farhan Muter

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-13

In this paper if we have Q and P are equivalent measures on the -field F and . We define the polar of C with respect to Q , denoted by Cْ(Q), and define bipolar Cْْْ ْ (Q)
of C with respect to Q .In this paper we study the relation between equivalent measures (p and Q) and bipolar of C. Also we prove Cْْْ ْ (Q) = Cْ ْ (P) .

Color Image Enhancement Using Histogram Modification

Ali M. Al-Juboori

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-14

Image enhancement involves taking an image and improving it visually, typically by taking advantage of the human visual system's response. In this paper, we will enhance the color image that may be dark or light by using histogram modification such as histogram equalization, histogram stretch and histogram shrink. The objective of the histogram equalization is to map an input image to an output image such that its histogram is uniform after the mapping.

VIDEO COMPRESSION USING DPCM AND WT

Nora M. Sahib

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-11

Digital images are widely used in computer applications. Uncompressed digital images require considerable storage capacity and transmission bandwidth. Efficient image compression solutions are becoming more critical with the recent growth of data intensive, multimedia-based web applications.This paper develops hybrid technique which employs combines differential pulse code modulation (DPCM) with wavelet transform. The wavelet transform is applied to the difference signal instead of direct applying it to the original images, because difference signal is almost nearly stationary. The difference signal is determined using interframe and intraframe DPCM. Intraframe method has given smoother difference signal because the frames used in the interframe prediction were not successive. The difference signal is then wavelet transformed and encoded using predictive edge detection from the LL band of the lowest resolution level to predict the edge in LH, HL and HH bands in the higher resolution levels. If the coefficient is predicted as an edge it is preserved; otherwise, it is discarded. In the decoder, the location of the preserved coefficients can also be found as in the encoder. Therefore, no overhead is needed. Instead of complex vector quantization, which is commonly used in subband image coding for high compression ratio, simple scalar quantization is used to code the remaining coefficients. A remarkable compression ratio of about 30:1 has been achieved without noticeable degradation in the decompressed images.

SOME PROPERTIES OF A NEW SUBCLASS OF MEROMORPHIC UNIVALENT FUNCTIONS WITH POSITIVE COEFFICIENTS DEFINED BY RUSCHEWEYH DERIVATIVE I

Waggas Galib Atshan; Rafid Habib Buti

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-10

In the present paper, we have studied a new subclass of meromorephic univalent functions with positive coefficients defined by Ruscheweyh derivative in the punctured unit disk and obtain some sharp results including coefficient estimates , growth and distortion bounds and closure theorems.
Mathematics Subject Classification : 30C40

SUBCLASS OF MULTIVALENT FUNCTIONS WITH NEGATIVE COEFFICIENTS DEFINED BY KOMATU OPERATOR

Waggas Galib Atshan; ALIA SHANI HASSAN

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 1, Issue 2, Pages 1-9

In this paper ,we introduce some properties of the class T ( p , A , B , , c , ) for multivalent
functions with negative coefficients defined by Komatu operator .We obtain coefficient estimates ,growth
and distortion theorem, radius of convexity for the classT ( p , A, B , , c , ) , closure theorems and con volution
property.