Study of eigen function and eigen values for energy by muller s method and COGI method by use Causs potential
Study of eigen function and eigen values for energy by muller s method and COGI method by use Causs potential

Abdul Adeem Z. Hameed

Volume 2, Issue 2 , August 2008, , Page 153-158

https://doi.org/10.37652/juaps.2008.15341

Abstract
  This study concern here on we shall compare the Eigenvalues and eigenfunction calculated numerically with those obtained by the asymptotic series (Muller,s method) and COGI method where ...  Read More ...
EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY
EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY

Sufyan T. Faraj

Volume 2, Issue 1 , April 2008, , Page 1-11

https://doi.org/10.37652/juaps.2008.15412

Abstract
  SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform ...  Read More ...
INVESTIGATION OF JAVA SMART CARD TECHNOLOGYFOR MULTI-TASK APPLICATIONS
INVESTIGATION OF JAVA SMART CARD TECHNOLOGYFOR MULTI-TASK APPLICATIONS

Sinan G. Abid Ali; Nidhal E. Berbat; Sufyan T. Faraj

Volume 2, Issue 1 , April 2008, , Page 12-23

https://doi.org/10.37652/juaps.2008.15423

Abstract
  The objective of this work is to build a number of different secure applets for Java smart card were each applet is designed for a specific task. Three packages were designed; the first ...  Read More ...
REMOVING IMAGE NOISE BASED ON FUZZY LOGIC CONCEPT
REMOVING IMAGE NOISE BASED ON FUZZY LOGIC CONCEPT

Warqaa Y.Ibraheem; Sahar Kh. Ahmed; Nada N. Saleem

Volume 2, Issue 1 , April 2008, , Page 43-55

https://doi.org/10.37652/juaps.2008.15430

Abstract
  In the present research algorithms employing fuzzy logic on median and mean filters for improving impulse noise removal performance for image processing have been developed. These algorithms ...  Read More ...
MONITORING SYSTEM FOR DETECTION OF OVER SPEED OBJECT
MONITORING SYSTEM FOR DETECTION OF OVER SPEED OBJECT

Ali M. Sagheer; Abdulrahman D. Khalaf

Volume 2, Issue 1 , April 2008, , Page 56-65

https://doi.org/10.37652/juaps.2008.15479

Abstract
  This paper introduces a system, which can be applied for monitoring of the speed of moving objects using a single camera. The Monitoring System is developed to monitor one moving object ...  Read More ...
Scintillation on non Standard Atmosphere
Scintillation on non Standard Atmosphere

Ahmed N. Rasheed

Volume 2, Issue 1 , April 2008, , Page 66-72

https://doi.org/10.37652/juaps.2008.15506

Abstract
  There are several methods to measure the magnitude of scintillation. Most of which their equations do not include meteorological element .In meantime we can not measure the magnitude ...  Read More ...
CODING OF VIDEO OVER IP-BASED NETWORKS
CODING OF VIDEO OVER IP-BASED NETWORKS

Samara A. Elia; Nasser N. Khamiss Alani

Volume 2, Issue 1 , April 2008, , Page 73-82

https://doi.org/10.37652/juaps.2008.15425

Abstract
  :This paper is developed to study the compression performance of video by using searching method of motion estimation OTS and SNR scalable coding to enhance the quality of video sample. ...  Read More ...
EFFICIENT WIRELESS VIDEO TRANSMISSION VIA LINKLAYER FEC FOR VIDEO COMMUNICATIONS
EFFICIENT WIRELESS VIDEO TRANSMISSION VIA LINKLAYER FEC FOR VIDEO COMMUNICATIONS

Ghaida A. AL-Suhail

Volume 2, Issue 1 , April 2008, , Page 83-93

https://doi.org/10.37652/juaps.2008.15451

Abstract
  In this paper, new analysis and performance of robust error-model are presented for MPEG-4 video stream over wireless point-to-point network. Analytical expressions assume a noisy wireless ...  Read More ...
ADAPTIVE LEARNING RATE VERSUS RESILIENT BACKPROPAGATION FOR NUMERAL RECOGNITION
ADAPTIVE LEARNING RATE VERSUS RESILIENT BACKPROPAGATION FOR NUMERAL RECOGNITION

Muntaser Abdul-Wahed Salman

Volume 2, Issue 1 , April 2008, , Page 94-105

https://doi.org/10.37652/juaps.2008.15445

Abstract
  Two types of neural networks learning algorithms were created, trained, tested, and evaluated in an effort to find the appropriate neural network training method for use in numeral ...  Read More ...
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME

Ali M. Sagheer

Volume 2, Issue 1 , April 2008, , Page 106-115

https://doi.org/10.37652/juaps.2008.15446

Abstract
  In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme. ...  Read More ...
IRIS SEGMENTATION USING GA BASED CIRCULAR HOUGH TRANSFORM (GACHT
IRIS SEGMENTATION USING GA BASED CIRCULAR HOUGH TRANSFORM (GACHT

Rabah N. Farhan

Volume 2, Issue 1 , April 2008, , Page 116-123

https://doi.org/10.37652/juaps.2008.15519

Abstract
  Iris recognition system consists of a sequence of stages, each stage perform specific functions on the captured image of the human iris. The first stage is automatic segmentation of ...  Read More ...
IWCD-PROPOSED IMAGE COMPRESSION METHOD BASED ON INTEGER WAVELET AND DCT
IWCD-PROPOSED IMAGE COMPRESSION METHOD BASED ON INTEGER WAVELET AND DCT

Abdullah.M.Awad Al-Fahdawi

Volume 2, Issue 1 , April 2008, , Page 124-130

https://doi.org/10.37652/juaps.2008.15443

Abstract
  This paper describes a new lossy image compression decompression algorithm. In lossy compression techniques there are some loss of information, and image cannot be reconstructed exactly.This ...  Read More ...
DESIGN OF NEWMODEL FOR SLR-PARSER
DESIGN OF NEWMODEL FOR SLR-PARSER

Essam T. Yassen

Volume 2, Issue 1 , April 2008, , Page 145-158

https://doi.org/10.37652/juaps.2008.15432

Abstract
  : In last decades the applications of the computerized system were widely used in various environments, such real time systems, monitoring system and other. These applications need ...  Read More ...
BITMAP INDEX: A DATA STRUCTURE FOR FAST FILE RETRIEVAL
BITMAP INDEX: A DATA STRUCTURE FOR FAST FILE RETRIEVAL

Murtadha M. Hamad

Volume 2, Issue 1 , April 2008, , Page 169-178

https://doi.org/10.37652/juaps.2008.15456

Abstract
  Bitmap structure indexes are usually used in database environments which have large amount of data. Bitmap reduces response time and storage requirements for large database compared ...  Read More ...
EFFICIENCY OF SOME CLASSIFICATION METHODS ADOPTED IN CLINICAL REMINDER SYSTEMS IN CASES OF MIXED DATA
EFFICIENCY OF SOME CLASSIFICATION METHODS ADOPTED IN CLINICAL REMINDER SYSTEMS IN CASES OF MIXED DATA

Imad H.A. AL-Iathary; Murtadhah M.H

Volume 2, Issue 1 , April 2008, , Page 179-185

https://doi.org/10.37652/juaps.2008.15442

Abstract
  Cluster analysis techniques are widely used in medical researches. Clustering techniques are not unique and hence users must be extremely conscious about what to use in order to analyze ...  Read More ...
A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING
A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING

Rana F. Ghani; Ahmed T. Sadik

Volume 2, Issue 1 , April 2008, , Page 186-194

https://doi.org/10.37652/juaps.2008.15462

Abstract
  The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm ...  Read More ...
STUDYING THE NUCLEAR STRUCTURE OF EVEN-EVEN DEFORMED GERMANIUM NUCLEUS
STUDYING THE NUCLEAR STRUCTURE OF EVEN-EVEN DEFORMED GERMANIUM NUCLEUS

ALI KALAF AOBAID

Volume 1, Issue 3 , December 2007, , Page 103-111

https://doi.org/10.37652/juaps.2007.15535

Abstract
  In the present work, the interacting boson model(IBM-1) for s and d boson is used to calculate the energy levels of the positive parity bands, electric quadrupole moments, E2-transition ...  Read More ...
LINEAR CODE THROUGH POLYNOMIAL MODULO Z
LINEAR CODE THROUGH POLYNOMIAL MODULO Z

MAKARIM ABDULWAHIDE

Volume 1, Issue 3 , December 2007, , Page 117-121

https://doi.org/10.37652/juaps.2007.15603

Abstract
  A polynomial p(x)= a + a x + …+ a x is said to be a permutation polynomial over a finite ring R If P permute the elements of R . where R is the ring ( Z , + , ) . It is known ...  Read More ...
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC

MOHAMMED T. IBRAHEM; SUFYAN T. FARAJ

Volume 1, Issue 3 , December 2007, , Page 122-135

https://doi.org/10.37652/juaps.2007.15559

Abstract
  Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques. This ...  Read More ...
PITTMAN MOTOR CONTROL USING NEURAL NETWORKS
PITTMAN MOTOR CONTROL USING NEURAL NETWORKS

WESAM M. JASIM

Volume 1, Issue 3 , December 2007, , Page 136-139

https://doi.org/10.37652/juaps.2007.15599

Abstract
  Neural networks are well-suited for the modeling and control of complex physical systems because of their ability to handle complex input-output mapping without detailed analytical ...  Read More ...
A NEW BLOCK CIPHER (NAHRAINFISH)BASED ON SOME AES FINALISTS
A NEW BLOCK CIPHER (NAHRAINFISH)BASED ON SOME AES FINALISTS

SUFYAN T. FARAJ

Volume 1, Issue 2 , August 2007, , Page 111-125

https://doi.org/10.37652/juaps.2007.15327

Abstract
  In this work, we present some deeper insights in the state-of-the-art in block cipher design. This is mainly achieved by assessment of the evaluation process of the AES (Advanced Encryption ...  Read More ...
DATA MINING AND STATISTICAL METHODS USED FOR SCANNING CATEGORICAL DATA
DATA MINING AND STATISTICAL METHODS USED FOR SCANNING CATEGORICAL DATA

Murtadha M.Hamad

Volume 1, Issue 2 , August 2007, , Page 126-134

https://doi.org/10.37652/juaps.2007.15361

Abstract
  It has been shown that data mining uncovers patterns in data using predictive techniques. These patterns play a critical role in decision making because they reveal areas for process ...  Read More ...
ON THE NUMBER AND EQUIVALENT LATIN SQUARES
ON THE NUMBER AND EQUIVALENT LATIN SQUARES

MAKARIM A. AL-TURKY

Volume 1, Issue 1 , April 2007, , Page 71-75

https://doi.org/10.37652/juaps.2007.15428

Abstract
  we determine the number of Latin rectangles with 11 columns and each possible number of rows, In clouding the Latin squares of order11. Also answer some questions of Alter by showing ...  Read More ...
THE CONSTRUCTION AND MAXIMAL SET OF MUTUALLY ORTHOGONAL LATIN SQUARES
THE CONSTRUCTION AND MAXIMAL SET OF MUTUALLY ORTHOGONAL LATIN SQUARES

MAKARIM A. AL-TURKY

Volume 1, Issue 1 , April 2007, , Page 76-81

https://doi.org/10.37652/juaps.2007.15496

Abstract
  Given aset of permutation {p1,p2, … . pk} on aset S, we say that the set of permutation is transitive on S if for every ordered pair of elements a,b € S, there exists at ...  Read More ...