About Journal

The journal of Al-Qadisiyah of computer science and mathematics is refereed journal holding ISSN (print)2074 – 0204, ISSN(online)2521-3504 . The journal accept original research papers to the editor , this journal covers subjects that include computer science, mathematics and Statistics & Information , is two issues per year, contributions in English and Arabic languages are accepted for submission provided that they conform to the universally accepted rules of scientific research.
Read More ...

Influence of Varying Temperature and Concentration on MHD Peristaltic Transport for Jeffrey Fluid with Variable Viscosity through Porous Channel

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 38-49

The present paper deals with the peristaltic motion of Jeffrey fluid with varying temperature and concentration through a porous medium in a coaxial uniform circular tube. The fluid is assumed to be non-Newtonian, namely Jeffrey fluid. The inner tube is uniform, while the outer flexible tube has a sinusoidal wave traveling down its wall. The analytical formulas of the velocity and temperature have been obtained in terms of the Bessel function of first and second kinds. The numerical formula of the axial velocity, temperature and concentration are obtained as functions of the physical parameters of the problem (Darcy number, magnetic parameter, thermal Grashof number, Reynolds number, Prandtl number, and Schmidt number) with other physical parameters are obtained. The Influence of physical parameters of the problem on this formula are discussed numerically and illustrated graphically through a set of figures.

Comprehensive Expansion in Big Data: Innovation and Technology

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 7-20

In recent year, the use of the internet and cloud-based application has increased tremendously. With this lot of internet apps and social network have been developed. This apps and networks are growing very rapidly. Data on this network belongs to different data sizes and structures. This data in simple language is called big data. With the increasing demand for services, all the big data services are now automated, which stores and retrieve consumer's data. This data is in a different structure which makes it difficult to handle. This can include an example of road traffic data, different vehicle or person or location or atmosphere can produce a different set of data. Sometimes this data is structured while some times it may contain repeated, null or noisy data. This data may contain images and videos. The traditional database cannot handle this type of unstructured data. The best to solve this dimensionality problem is by using a dimensionality reduction technique. This paper provides the concept of big data collection, its analysis, storage and handling issues, security challenges, and other data handling technique.

Inverse Triangular and Hyperbolic Acceleration Methods of Second Kind for Improving the Numerical Integration Results

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 60-65

The aims of this study are to introduce the acceleration methods which are called inverse triangular acceleration methods and inverse hyperbolic triangular acceleration methods, which we generally call Al-Tememe's acceleration methods of the second kind discovered by (Ali Hassan Mohammed). It is useful to improve the numerical results of continuous integrals in which the error is of the 4th order, and regarding to accuracy, the number of used partial intervals and how fast is to get results especially to accelerate the results that can be got by using Simpson's method. Also, it is possible to utilize it in improving the numerical results of differential equations ,where the main error is of the forth order.

On a Subclass of Meromorphic Univalent Functions Involving Hypergeometric Function

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 12-20

The main object of the present paper is to, introduce the. class of meromorphic univalent functions Involving! hypergeomatrc function .We obtain~ some interesting geometric properties according to coefficient inequality , growth and distortion theorems , radii of starlikeness and convexity for the" functions in our subclass.

Some Results on Symmetric Reverse ∗-n-Derivations

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 1-11

In this paper, the commuting and centralizing of symmetric reverse ∗-n-derivation on Lie ideal are studied and the commutativity of prime ∗-ring with the concept of symmetric reverse ∗-n-derivations are proved under certain conditions.

Robust logistic regression in the presence of high leverage points

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 1-11

In this article we conceder the logistic regression model with high leverage points. For the logistic regression model with a binary response, we suggested a new robust approach called robust logistic regression (RLR) based on the robust mahalanobis distance (RMD) which depends on the minimum volume ellipsoid (MVE) estimators. The RMD is computed by using the algorithm of stochastic gradient descent (SGD). In order to assist the new suggested approach we compare it with some existing method such as maximum likelihood estimator and robust M-estimator in logistic regression model. The simulation study points that the RLR has supreme performances throw some measurement comparison.

Strongly b star(Sb*) – cleavability(splitability)

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 21-25

A. Poongothai, R. Parimelazhagan[5] introduced some new type of seperation axioms and study some of their basic properties. Some implications between T_0, T_1and T_2 axioms are also obtained. In this paper we studied the concept of cleavability over these spaces: ( sb*-T_0, sb*-T_1, sb*-T_(2 ) ) as following:
1- If P is a class of topological spaces with certain properties and if X is cleavable over P then X∈P
2- If P is a class of topological spaces with certain properties and if Y is cleavable over P then Y∈P

Proposed Arabic Information Retrieval System Using Cat Swarm Optimization

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 1-6

According to the recently published research, the developed Information Retrieval systems are concerned with English language documents compared to all others in Arabic language. لإthe morphological difficulty of Arabic language increases the concerns for the availability of Arabic test copora. Therefore, This paper presents an Arabic information retrieval system for text documents. The proposed algorithm uses Cat Swarm Optimization to select the most important features with the cosine similarity. In addition, it finds the most relevant document to user query. The simulation results in using the standard NLEL of Arabic dataset corpus. The proposed algorithm for Arabic document retrieval uses swarm optimization with cosine similarity which provides effectively with accuracy 81.4%.

Advantages and Disadvantages of Automatic Speaker Recognition Systems

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 21-30

Automatic speaker recognition systems use the machines to recognize an individual via a spoken sentence. Those systems recognize a specific individual or confirm an individual’s claimed identity. The most common type of voice biometrics is the Speaker Recognition. Its task focused on validation of a person’s claimed identity, using features that have been obtained via their voices. Throughout the last decades a wide range of new advances in the speaker recognition area have been accomplished, but there are still many problems that need solving or require enhanced solutions. In this paper, a brief overview of speech processing is given firstly, then some feature extraction and classifier techniques are described, also a comparative and analysis of some previous research are studied in depth, all this work leads to determine the best methods for speaker recognition. Adaptive MFCC and Deep Learning methods are determined to be more efficient and accurate than other methods in speaker recognition, thus these methods are recommend to be more suitable for practical applications.

Strongly (E,F)-convexity with applications to optimization problems

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 66-75

In this paper, a new class of nonconvex sets and functions called strongly (E,F)-convex sets and strongly (E,F)-convex functions are introduced. This class is considered as a natural extension of strongly E-convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly (E,F)-convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly (E,F)-convex.

Influence of Heat Transfer on Magnetohydrodynamics Oscillatory Flow for Carreau-Yasuda Fluid Through a Porous Medium

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 76-88

This paper, we have examined the influence of transfer the heat on the magnetohydrodynamics (MHD) oscillatory flow of Carreau-Yasuda fluid through porous medium for two types of geometries "Poiseuille flow and Couette flow". We have solved the problem by using the perturbation technique in terms of the Weissenberg number (We), discussed and analyzed the numerical and arithmetical results of the effect of several parameters, namely The number of Darcy, the number of Reynold, the number of Peclet, the parameter of magnetic, the number of Grashof, the number of Weissenberg, frequency of the oscillation and radiation parameter for the velocity and temperature that are effective on the fluid movement by using MATHEMATICA program using illustrations.

Weakly Secondary Submodules

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 11, Issue 3, Pages 50-59

Let M be a non-zero right module over a ring R with an identity. The weakly secondary submodule is introduced in this paper. A non-zero submodule N of M is weakly secondary submodule when Nab⊆K, where a, b∈R and K is a submodule of M implies either Na⊆K or Nb^t⊆ K for some positive integer t. Some relationships between this class of modules and other related modules are discussed and number of conclusions and characterizations are obtained.

On Fuzzy Normed Space

Noori F. Al-Mayahi; Intisar H. Radhi

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 4, Issue 2, Pages 1-13

This paper studies the concepts of fuzzy normed space and introduces definitions to the convergence fuzzy normed space, fuzzy continuity. It also proves some theorems in this subject.

New Class of Meromorphic Univalent Functions

Waggas Galib Atshan and Faiz Jawad Abdulkadhim

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 7, Issue 1, Pages 106-118

In this paper We define a new class of meromorphic univalent functions in the
punctured unit disk. We obtain coefficient inequalities, Closure Theorem, convex
companion , distortion bound , Partial sums and neighborhood property, and Hadamard
product. Atshan[9], Cho et al.[6], Atshan and Kulkarni[3], Seoudy and Aouf [7] studied the
meromorphic univalent functions for another classes.

On the(G.n)_ Tupled fixed point theorems in fuzzy metric spacea

Zena Hussein Maibed

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 10, Issue 2, Pages 15-25

The porpose of this paper is to introduce a new concepts of (G.n)- tupled fixed point and (G.n)- tupled coincidence point. And, to study the existence of tupled fixed (coincidence) point for any type of mappings. We will also establish some convergence theorems to a unique (G.n) – tupled fixed (coincidence ) point in the complete fuzzy metric spaces.

Complaint Monitoring System Using Android in Iraq

Raghad Baker Sadiq Majeed

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 10, Issue 2, Pages 1-9

Despite the widespread use of smartphones in Iraq and the possession of a vast number of people, the Iraqi environment is still lacking efficient applications that provide a real collaboration between the citizens and government through advanced diverse services. These applications will increase the transparency through monitoring the performance of the government institutions by citizens. Moreover, citizens can enforce the government employees to finish their works efficiently on time. Mayoralty of Baghdad is one of these institutions that contains many municipalities which are responsible for maintaining and running the city. Complaint Monitoring System (M-complaint) is created to help citizens to submit their complaints with photos of problem’s locations and track their locations using Global Positioning System (GPS) accurately. Citizens can track their complaints and reply the amount of satisfaction to the solutions which provided by municipalities. In addition, daily, the system will automatically filter the unsolved claims within seven days and submit a notification to the higher authority to find the suitable solutions. The aim of creating this application is to simplify the process of registering a complaint to the municipal and monitor the status of it (solved/not solved) in a quicker and cheaper way. Also, it measures the amount of citizens 'satisfaction depending on the provided solutions. If the problem were not be resolved within seven days, the system would automatically send a notification to the higher authority to follow up neglected complaints and take necessary actions. This system supports transparency and integrity and enables both citizens and officials to follow up on the performance of their employees. It considers as a part of Mobile government (M-government).

Topological study via σ-algebra

Yiezi kadham Al-talkany; Ameer A.J. AL-Swidi; Ali Younis Shaker

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 8, Issue 1, Pages 78-82

in this research we want to study some of theTopological definitions and theorems by using the concept of σ -algebra. In this paper we define the continuity and separation axioms with respect to this concept .

R-tree for spatial data structure

Hassnen Hazem Azez

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 10, Issue 2, Pages 27-35

Spatial database usually consult with the gathering of records which have a spatial coordinates and are described inside a space.
On the way to support spatial items in a database gadget several issues need to be taken into consideration inclusive of spatial records models, indexing mechanisms, efficient query processing, and value models.
A commonplace real global usage for an R-tree data shape might be to save spatial item, after which discover answer quick to queries. This means that its miles and green and essential index creation for plenty multidimensional statistics base software because each construction time and performance profits in question processing are vital. The proposed work is a simple implementation of spatial data structure that supports the manipulation, storage, and analysis and display data in visual form.

The Technique of Robust – Loess in Regression Analysis


Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 8, Issue 1, Pages 22-27

In this paper the robust-loess method is used to estimate the nonparametric regression function. The Loess is non-robust method and used in case of outliers where it bases on the less squares in regression which affects by presence of outliers. In this paper, the robust-loess has been implemented through applying the last absolute residuals and bi-square techniques which enhanced robustness to the weighted least squares in loess.

Comparative Study the Effect of Similarity Measures on K-Means Algorithm in Clustering Arabic Texts based on Keywords

Suhad muhajer kareem

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 7, Issue 1, Pages 11-24

يعيمجت دع )ةدقنع( صوصنلا أ ىلإ صوصنلا عيمجت فدهي ثيح ، صوصنلا بيقنت يف ةلاعفلاو ةماهلا لئاسولا دح
اهنيب اميف هباشتت تانايك ىلع يوتحت )ديقانع(تاعمجت ىعدت ةريغص عيماجم ىلإ صوصنلل ةريبكلا عيماجملا ميسقت
وصنلا عيمجتل ةقيرط لمعلا اذه يف انمدق .ىرخلأا تاعمجتلا يف تانايكلا نع ةفلتخم نوكتو ىدحإ مادختساب ةيبرعلا ص
ةيمزراوخب ةلثمتملاو ةروهشملا عيمجتلا تاينقت k-means ىلإ هتئيهتل ةيلوأ ةوطخك صنلا ليلحت ةقيرطلا تنمضت .
ىلع تقبط يتلا ةدقنعلا ةيمزراوخ 011 ، مئارج ، نف ، ةضاير( تلمش ةفلتخم فانصأ عبرأب يبرع صن ةيبط ، )
ةدعاق دامتعاب ةقيرطلا انروط ثيح نم لادب عيمجتلا زكارم رايتخلا لاجم لكب ةصاخلا ةيحاتفملا تاملكلا نم تانايب
م( امه هباشتلل نيسايقم انمدختسا مث يئاوشع لكشب اهرايتخا سايقمو ةيديلقلاا ةفاسملا سايق بييجت ةيوازلا باسحل )
عيمجتلا زكرم نيب تافاسملا تلا سيياقم ريثات انميق . ديقانعلا ءانبل تادنتسملاو )ةيوازلا بييجت ،ةيديلقلاا ةفاسملا( هباش
ةيمزراوخ جئاتن ىلع k-means مييقتلا سايقم مادختساب F-Measure هيزاجنا نيب ةنراقم نع ةرابع جئاتنلا تناكو
لا هباشت سايقم مادختساب ةيمزراوخ ةيديلقلاا ةفاسملا سايقمو بييجت ةيوازلا تاعمجتلا ددع اهنم لماوعلا نم ددع ىلعو
ددعو فانصلأا . هيزاجنا ناب انضحلا اريخأو ةيمزراوخ k-means نم لضفا وه ةيوازلا بييجت سايقم مادختساب
مادختساب اهتيزاجنا .ةيديلقلاا ةفاسملا

An Efficient Classification Algorithms for Image Retrieval Based Color and Texture Features

Iman Abduljabbar Saad

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 10, Issue 1, Pages 42-53

Content-Based Image Retrieval CBIR system commonly extracts retrieval results respecting to the similarities of the extracted feature of the given image and the candidate images. The proposed system presented a comparative analysis of five types of classifiers which used in CBIR. These classifiers are Multilayer Perceptron (MP), Sequential Minimal Optimization (SMO), Random Forest (RF), Bayes Network (BN) and Iterative Classifier Optimizer (ICO). It has been investigated to find out the best classifier in term of performance and computation to be the suitable for image retrieval. The low level image features which include texture and color are used in the proposed system. The color features involve color-histogram, color-moments and color-autocorrelogram while texture features involve wavelet transform and log Gabor filter. Also the system will include hybrid of texture and color features to get efficient image retrieval. The system was tested using WANG database, and the best average precision achieved was (85.08%) when combining texture and color features and using the (RF) classifier.

Brain MRI Enhancement using Brightness Preserving Dynamic Fuzzy Histogram Equalization

Hikmat Z. Neima

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 6, Issue 1, Pages 38-51

In the field of digital image processing, medical imaging is one of the most important applications areas. However; low contrast and poor quality are the main issues in medical image. So it is essential to enhance images so that the result is more suitable for post processing and diagnosis. Histogram equalization has been proved as an effective and simple technique used as contrast enhancer. This paper presents an efficient method for brain MRI image enhancement. Discrete Wavelet Transform (DWT) has been utilized to decompose MRI image. Brightness Preserving Dynamic Fuzzy Histogram Equalization (BPDFHE) applied on the important part of the decomposed image. Finally, inverse of discrete wavelet transform is carried out to get the enhanced image. Experiments results that were obtained showed the effectiveness of proposed method.

Publisher: Al-Qadisiyah University

Email:  Journalcm@qu.edu.iq

Editor-in-chief: Lecturer Dr. Qusuay Hatim Eghaar

Editor-in-chief: Assistant Professor Dr. Mohammed Abbas Kadhim

Print ISSN: 2074-0204

Online ISSN: 2521-3504

Keyword Cloud