2023-01-29T16:08:12Z
https://csm.iraqjournals.com/?_action=export&rf=summon&issue=8208
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Weak Armendariz Zero Knowledge Cryptosystem
Areej
M. Abduldaim
Innovative idea using ring theory is raised to build a new algorithm for zero knowledge (ZK) cryptosystem. In this paper we introduce an algorithm for zero knowledge protocol based on a specific kind of rings named weak Armendariz. On the other hand, the aim of this paper focuses on the category of noncommutative algebraic structures to describe a new algebraic scheme of zero knowledge proof using weak Armendariz rings. As a result, we employ for the first time weak Armendariz rings in the science of cryptographic which regards as a new application of this class of rings. Finally, we present a novel idea combining between abstract algebra and cryptography.
Zero knowledge protocol
Weak Armendariz rings
Authentication
Nilpotent element
2017
12
28
1
6
https://csm.iraqjournals.com/article_134535_411a2d8078f6dbc910e7b73cb654f52b.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
On Fuzzy Measure on Fuzzy sets
Karrar
S. Hamzah
Noori
F. Al-Mayahi
In this paper, we study the fuzzy measure on fuzzy sets and prove some new properties.
Keywords: Fuzzy measure, semi continuous fuzzy measure, null additive fuzzy measure, fuzzy measure accountably weakly null-additive fuzzy measure.
Fuzzy measure
semi continuous fuzzy measure
null additive fuzzy measure
fuzzy measure accountably weakly null
additive fuzzy measure
2017
12
28
7
12
https://csm.iraqjournals.com/article_134537_43f8eb60a0b237e577ed5ca7cb1542c6.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Additivity of Higher Multiplicative Mappings in Rings
Rajaa
C.Shaheen
We study the additivity of higher multiplicative mappings in rings.
2017
12
28
13
16
https://csm.iraqjournals.com/article_134538_4a20000c3fa0513b78e2b36137a5ffb3.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
On ms-Convergence of Nets and Filters
Fieras
Joad Obead Al-Ysaary
"In this paper I'm introduce and study another type of convergence in a minimal structures namely Minimal Structure Convergence (ms-convergence) of nets and filters by using the concept of ms-open sets". "Also I'm investigate some properties of these concepts". "As well as I'm used two functions on the basis of Minimal structure in various forms, one check transmission character compacting minimal structure and other check transmission two characters compacting minimal structure and compact from one side depending on the requirements of research".
minimal structure
open
closed
Convergent
limit
Cluster
2017
12
28
17
25
https://csm.iraqjournals.com/article_134539_cb2dd168befb6b70c603c876dd31080a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
A New Subclass of Harmonic Univalent Functions
Najah
Ali Jiben Al-Ziadi
Waggas
Galib Atshan
In this paper, we define a new class of harmonic univalent functions of the form f=h+¯g in the open unit disk U. We obtain basic properties, like, coefficient bounds, extreme points, convex combination, distortion and growth theorems and integral operator.
Univalent function
harmonic function
extreme point
convex combination
integral operator
2017
12
28
26
32
https://csm.iraqjournals.com/article_134540_99862adc40db08b9daf80d6f4657bfba.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Coefficients Bounds for a General Subclasses of m-Fold Symmetric Bi-Univalent Functions
Najah
Ali Jiben Al-Ziadi
Waggas
Galib Atshan
In this paper, we introduce and investigate a new general subclasses R_(Σ_m ) (τ,λ,η;α) and R_(Σ_m ) (τ,λ,η;β) of Σ_m consisting of analytic and m-fold symmetric bi-univalent functions in the open unit disk U. We obtain estimates on the Taylor-Maclaurin coefficients |a_(m+1) | and |a_(2m+1) |. Also, we obtain new special cases for our results.
Analytic function
Univalent function
Fold symmetric function
Fold symmetric bi
univalent function
2017
12
28
33
39
https://csm.iraqjournals.com/article_134542_58fd3cd9a94e9cf120b921ee495c8308.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
SOME RESULTS ABOUT CORETRACTABLE MODULES
Shukur
Neamah Al-aeashi
Inaam
Mohammed Ali Hadi
Throughout this paper, all rings have identities and all modules are unitary right modules. Let R be a ring and M an R-module. A module M is called coretractable if for each proper submodule N of M, there exists a nonzero homomorphism f from M/N into M. Our concern in this paper is to develop basic properties of coretractable modules and to look for any relations between coretractable modules and other classes of modules.
coretractable modules
multiplication modules
quasi
Dedekind modules
rationally
prime module
2017
12
28
40
48
https://csm.iraqjournals.com/article_134543_b1a98b5b6f077196f76e953ce5aa70b7.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Equivalent of permutation polytopes with applications
Batool
A. Hameed
Shatha
A. Salman
An open conjecture that relates to the equivalents between the permutation polytopes associated to their groups is proved and also the proof for two permutation groups which are effectively equivalent implies the permutation polytopes associated to these groups is combinatorial equivalent is given.
polytope
lattice points
permutation groups
2017
12
28
49
53
https://csm.iraqjournals.com/article_134544_d05df806a478972da87f1a745ba108e6.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Rate of approximation of K-monotone functions in L_(ψ,p) (I) space , 0
Nada
Zuhair Abd AL-Sada
Noor
Hayder Abdul Ameer
Adel
Salim Tayyah
Akeel
Ramadan Mehdi
Dhurgham
Aiham Kadhim Alshakarchi
Maytham
Salman azeez
Emad
Allawi Shallal
Saad
Abdulkadhim Al-Saadi
Mehdi
S. Abbas
Rana
J.S. Al-janabi
Shroouq
J.S. Al-janabi
Zinah
Hussein Toman
Sarim
H. Hadi
Noori
F. AL-Mayahi
Ali
Ayid Ahmad
Ahmed
Chalak Shakir
Hassan
Nadem Rasoul
Alaa
Saleh Hadi
Ali
Hassan Mohammed
Sara
F. Hassan
Boushra
Y. Hussein
Thekra
Abbas
M.Nafea
Jafaar
Hanadi
A. AbdulSatter
Intisar
Shadeed Al-Mejibli
Dhafar
Hamed Abd Dhafar Hamed Abd
Salam
Abdulkhaleq Noaman
Alaa
H. Al-Muslimawi
Bashaeer
K. Jassim
Haider
Kadhim Hoomod
Intisar
Al-Mejibli
Abbas
Issa Jabboory
Farhan
Dakhil Shyaa
Dhyaa
Shaheed Al-Azzawy
Sinan
Adnan Diwan
Ahmed
Talip Hussein
Haider
Jebur Ali
Habeeb
Kareem Abdulla
Shatha
S.Alhily
In this paper we shown that the relationship with the best algebraic approximation and K- monotone functions with bounded ( i ) such that (i
Keywords
Monotone functions
---
approximation
---
Modulus of smoothness.
---
الدالة المتناوبة
---
التقريب
---
مقياس النعومة .
Monotone functions
approximation
modulus of smoothness
Particle swarm optimization
Bees algorithm
D logistic map
Local optimal
Global optimum
Small Injective rings
Soc
Injective rings
Perfect rings
quasi
Frobenius rings
Cellular manufacturing
Genetic Algorithms
Optimization
layout
Gamma module
injective gamma module
extending gamma module
essential gamma submodule
closed gamma submodule
algebra
algebra metric space
Convergent
contraction function
fixed point theorem and B
algebra expansion
MANET
DSR
DSSR
DoS
AODV
Spectrum Order Banach algebra
Strong algebra cone in OBA
condition Quasi nilpotent
the radical and The condition pseudospectrum
Breast Cancer
Contrast Limited Adaptive Histogram Equitation
mammogram
wiener filter
Korovkins
Baskakov Operators
Baskakov Kantorovich operators
Android
Decision tree
Mushroom Determination
Mobile device
Naive Bays
Double keys
playfair
cipher text only attack
frequency attack
Finite Element Methods
Galerkin Method
Navier
Stokes
Artificial Compressibility Method
Newtonian Flow
SOM
Traffic
Cell Tower
LEARNING RATE
neighborhood functions
maximal submodule
semimaximal submodule
semimaximal submodule and t
semisimple modules
government
government security
Agent system
Intelligent JAVA system
Intelligent Systems
Univalent Function
Positive Harmonic Functions
Growth of Solution
2017
12
28
54
56
https://csm.iraqjournals.com/article_134660_c21ee75511f826ffb3c9fbc1a82e98a9.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
SS-Injective Modules and Rings
Adel
Salim Tayyah
Akeel
Ramadan Mehdi
We introduce and investigate SS-injectivity as a generalization of both soc-injectivity and small injectivity. A right module M over a ring R is said to be SS-N-injective (where N is a right R-module) if every R-homomorphism from a semisimple small submodule of N into M extends to N. A module M is said to be SS-injective (resp. strongly SS-injective), if M is SS-R-injective (resp. SS-N-injective for every right R-module N). Some characterizations and properties of (strongly) SS-injective modules and rings are given. Some results on soc-injectivity are extended to SS-injectivity.
Small Injective rings
Soc
Injective rings
Perfect rings
quasi
Frobenius rings
2017
12
28
57
70
https://csm.iraqjournals.com/article_134661_7d20e944340805fb38fd9f40f65ef81a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
(Quasi-)Injective Extending Gamma Modules
Emad
Allawi Shallal
Saad
Abdulkadhim Al-Saadi
Mehdi
S. Abbas
In this paper we introduce and study the concept of injective (Quasi-injective) extending gamma modules as a generalization of injective (Quasi-injective) gamma modules. An R_Γ-module E is called injective (Quasi-injective) extending gamma modules if each proper R_Γ-submodule in E is essential in injective (Quasi-injective) R_Γ-submodule of E. The concept of injective extending gamma modules lie between injective gamma modules and quasi-injective gamma modules.
Gamma module
injective gamma module
quasi
extending gamma module
essential gamma submodule
closed gamma submodule
2017
12
28
71
80
https://csm.iraqjournals.com/article_134665_547b260a1b78afc6c293d9d4a1a3fbf8.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
B-C^* algebra Metric Space and Some Results Fixed point Theorems
Sarim
H. Hadi
Noori
F. AL-Mayahi
On the aim and properties of C^*- algebra, in this paper we introduce the two concepts B-C^* algebra and B-C^*algebra metric space as well as introduce concept convergent and Cauchy sequence in space and to study the existence of fixed point theorems with contraction condition and B-C^* algebra expansion on this space.
algebra
algebra metric space
Convergent
contraction function
fixed point theorem and B
algebra expansion
2017
12
28
81
87
https://csm.iraqjournals.com/article_134666_b76ff082c407c94fd3da856ebce24dfd.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Integration of the Al-Tememe Transformation To find the Inverse of Transformation And Solving Some LODEs With (I.C)
Hassan
Nadem Rasoul
Alaa
Saleh Hadi
Ali
Hassan Mohammed
Our aim in this paper is to find the integration of Al-Tememe (T) transformation to help us in finding (〖 T〗^(-1)) for some functions without using of partition method and solve linear ordinary differential equations (LODEs) with variable coefficients by using (I.C) .
2017
12
28
88
93
https://csm.iraqjournals.com/article_134667_17062f48342fae2094734216ca936b79.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
The Condition Order Spectrum
Sara
F. Hassan
Boushra
Y. Hussein
In this paper, we will study the relation between complex character f and the condition order spectrum 〖SP〗_ε (a) in real and complex ordered Banach algebra A .We prove many properties on it,s . afterwards, we prove that 〖SP〗_ε (a) is upper semi continuous Finally we will show the relation between condition Quasinilpotent 〖QN〗_ε (A) and the radical .
Spectrum Order Banach algebra
Strong algebra cone in OBA
condition Quasi nilpotent
the radical and The condition pseudospectrum
2017
12
28
94
102
https://csm.iraqjournals.com/article_134668_0e2ab7989dd53fdb334e335caa0855bf.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
On approximation f by (α,β,γ)-Baskakov Operators
Hanadi
A. AbdulSatter
In the present paper, we study some application properties of the approximation for the sequences M_(n,γ)^(α,β) (f;x) and B_(n,γ)^(α,β) ( f; x ). These sequences depend on the arbitrary (but fixed) parameters α,β and γ. Here, we study the effect of these parameters on tends speed of the two families of operators M_(n,γ)^(α,β) (f;x) and B_(n,γ)^(α,β) ( f; x ) and the CPU times which are occurring on the approximation by a choosing fixed n.
Korovkins
Baskakov Operators
Baskakov Kantorovich operators
2017
12
28
103
114
https://csm.iraqjournals.com/article_134669_513109c2abe2543a356d6669443d1c54.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Numerical analysis of Newtonian flows based on artificial compressibility AC method
Alaa
H. Al-Muslimawi
Bashaeer
K. Jassim
In this study, numerical analysis for incompressible Newtonian flows has been conducted by using an artificial compressible method ( -method) based on the Galerkin finite element approach. As well known, Naiver-Stoke partial differential equations are employed to describe activity of the fluid. This model, which consists of two differential equations; named the conservation of mass and time-dependent conservation of momentum is presented in cylindrical coordinates system (Axisymmetric flow). The effects of many factors such as Reynolds number ( ) and artificial compressibility parameter ( ) are discussed in the present study. In particular, this study emphasized on the impact of these parameters on the level of convergence. To satisfy the analysis of the method, Poiseuille flow along a circular conduit under isothermal condition is utilized as a simple test problem. This test is conducted by taking a circular cross section of pipe.
Finite Element Methods
Galerkin Method
Navier
Stokes
Artificial Compressibility Method
Newtonian Flow
2017
12
28
115
128
https://csm.iraqjournals.com/article_134670_0d35f419d4b32e4ae9c4119988721dd4.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
T-semimaximal submodules
Farhan
Dakhil Shyaa
In this paper, we define and study the notions of t-semimaximal submodule as a generalization of semimaximal submodule. We provided many properties and characterizations of this concept are provided.
maximal submodule
semimaximal submodule
semimaximal submodule and t
semisimple modules
2017
12
28
129
133
https://csm.iraqjournals.com/article_134672_c904488a678ae3a67814f06808cd0887.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Limit Sets and Cartan D – space
Ahmed
Talip Hussein
Haider
Jebur Ali
Habeeb
Kareem Abdulla
The main goal of this work is to create a general type of D – space , namely, Cartan D – space and a new type of limit sets , namely, limit sets , and, give some properties and some equivalent statement of these concept also we explain the relationship among the definitions Cartan D – space and ,
2017
12
28
134
140
https://csm.iraqjournals.com/article_134673_8cab3819afe3ac7be1e6fd018ec1a49b.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Close-to-convex Function Generates Remarkable Solution of 2^nd order Complex Nonlinear Differential Equations
Shatha
S.Alhily
Consider the complex nonlinear differential equation f^'' (z)-2/z f^' (z)-2/z^2 f^3 (z)= H(z) , where P(z)= (-2)/z,Q(z)=(-2)/z^2 are complex coefficients, and H(z) be a complex function performs non- homogeneous term of given equation.
In this paper, we investigated that w(z)=(zf^')/f is a remarkable solution of given equation and belongs to hardy space H^2 ; with studying the growth of that solution by two ways ; through the maximum modulus and Brennan’s Conjecture and another by finding the supremum function of a volume of the surface area 〖K 〗_θ. Furthermore, we discussed the solution behaviour with meromorphic coefficients properties for given equation.
Univalent Function
Positive Harmonic Functions
Growth of Solution
2017
12
28
141
147
https://csm.iraqjournals.com/article_134676_5abea1df8c7f3d3c9296efa60386dde9.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Robust and Secured Image Steganography using LSB and Encryption with QR Code
Hazim
Noman Abed
The great development obtained with digital communication system depends on the improvement of the amount and security of transmitting information, the secrecy of data transmitted becomes a main subject for the researcher. Cryptography and Steganography play a major role for secured data transfer. In this research, the cryptography and steganography method was proposed for information security. In cryptography, the encrypted message was obtained by XOR the secret message with QR code. While, in Steganography the encrypted message was embedded inside cover image using LSB technique. The new approach in this research is use of the QR technique as well as the encrypted message was hidden in places selected using the bat algorithm. Secret message with different sizes was tested with many cover imagesto verify the efficiency of the proposed method. In the end, to measure the quality of cover image after the process of embedding, a group of standard parameters has adopted. The results of parameters showed the proposed method hasthe highest security and integrity.
Steganography
Cryptography
BAT algorithm
QR Code
2017
12
28
1
9
https://csm.iraqjournals.com/article_134677_3a0a3ee472e96c73b0320e656bc4991a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
The effect of random waypoint mobility infrastructure for wireless networks
Aseil
nadhum kadhum
Aseel
nadhum kadhum
Mobile wireless sensor networks (mwsns) have as of late propelled a developing well known class of wsn in which portability assumes a key part in the execution of the application. As of late, portability has turned into an imperative zone of research for the wsn group. The expanding abilities and the diminishing expenses of portable sensors make versatile sensor systems conceivable and viable. In spite of the fact that wsn organizations were never imagined to be completely static, portability was at first viewed as having a few difficulties that should have been defeat, including availability, scope, and vitality utilization, among others. be that as it may, late studies have been indicating versatility in a more ideal light. In this article, an outline of proposition that assess portable correspondence in wsns is exhibited.
Accordingly ,an assortment of versatility were proposed by analysts throughout the years where every portability display has its own particular properties that may influence the execution of the system in a way that varies from different models entitled with various properties. In this paper we give a study of versatility models that can be utilized as a part of remote sensor systems since it is imperative to give an arrangement of the accessible models along these lines a few portability models were looked into in the proposed work.
mwsns
mobility
Random
memory
AODV
Mwsns
2017
12
28
10
18
https://csm.iraqjournals.com/article_134682_0b78caf85d37a1cd934965747c071ff3.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Convert 2D shapes in to 3D images
Rasha
falah
Rafeef
mohammed
There are several complex programs that using for convert 2D images to 3D models with difficult techniques. In this paper ,it will be introduce a useful technique and using simple Possibilities and language for converting 2D to 3D images. The technique would be used; a three-dimensional projection using three images for the same shape and display three dimensional image from different side and to implement the particular work, visual programming with 3Dtruevision engine would be used, where its given acceptable result with shorting time. And it could be used in the field of engineering drawing.
D image
Diminutions images
2017
12
28
19
23
https://csm.iraqjournals.com/article_134684_121e301f2ae9d2d9f321d8267d757c05.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
E-Management System of Kirkuk University Based on Distributed Database
Banaz
Anwer Qader
Kamal
Hasan Jihad
Yalmaz
Najm Alddeen Taher
This research includes an analytical study of the administrative and scientific work in departments, branchs and units of the Kirkuk University Presidency. It aims to convert the traditional routine work to the electronic work at the university by applying E-Management technique as one of the required modern logical solutions most commonly used to facilitate the difficulty of managing the vast amount of documents and delaying workflow that facing most institutions and organizations. In view of the increasing and urgent need for the use of E-Management systems throughout all the departments of the university presidency, the Electronic Distributed Kirkuk University Management System (E-DKUMS) is designed by using of Distributed Databases (DDB) technique, as well as using of electronic network infrastructure (LAN) that connects all the university configurations. The results of system implementation demonstrated that it is distinguished with high performance and speed, very high reliability and security, as well as very few employment cost. Test and evaluation results proved the ability of the system to facilitate the progress of managerial functions, reduce the time and effort, and capability of restructuring the administrative structure because of its excellence with flexibility in the creation and deletion departments, branches, and units for the system; in addition to easily troubleshot and fast execution.
management
DDB
DDBMS
government
Kirkuk University
ICT
2017
12
28
24
34
https://csm.iraqjournals.com/article_134686_56eed1dc1c1430fb6889a619d6f4464e.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques
Ghadah
Al-Khafaji
Shaymaa
Fadhil
Image compression is a serious issue in computer storage and transmission, that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information
Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the mathematical model and the residual.
In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless compression scheme of first stage that corresponding to second stage.
The tested results shown are promising in both two stages, that implicilty enhanced the performance of traditional polynomial model in terms of compression ratio , and preresving image quality.
Image compression
fixed predictor
Wavelet Transform
linear polynomial and nearlossless techniques
2017
12
28
35
44
https://csm.iraqjournals.com/article_134692_83e833ba352da365250971e7f020a8a2.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
A Proposed Model for the Mutual Dependency Between QoE and QoS in Wireless Heterogeneous Networks
Hasan
F. Khazaal
Rawaa
I. Farhan
Baraa
I. Farhan
Haider
Th. Salim ALRikabi
Stavros
Kotsopoulos
Stavros
Kotsopoulos
Streaming of video over wireless heterogeneous networks coping with the problem of packet loss which affects the perceived video quality. The service providers usually use the Peak Signal to Noise Ratio PSNR as a metric measure for the quality of their provided service. So they use the quality of service QoS of the network as a sign on the quality of their presented service. The QoS deal with the objective tests of the provided service, which mean the measure of PSNR of the presented objects. The presented objects may not get the satisfaction of the network users due to many factors although that the PSNR of the used service is enough for presenting the service. Recently the service providers use the Quality of Experience QoE term which deal with the subjective test of the presented object (i.e. the user satisfaction measure). In this paper we propose a new model to identify the importance or the significance of the role of the QoE assessment for the service providers. To verify our proposed model we did a referendum for 55 participants in order to assess their judgment on the quality of some presented videos. The results of the referendum match the consideration of the proposed model.
QoS
QoE
2017
12
28
45
55
https://csm.iraqjournals.com/article_134693_1323b9a449df8528247d90ed6da5f283.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Finger print Feature Extraction Using Hybrid Approach: QPSO and Bees Algorithms Based on 3D Logistic Map
Noor
Hayder Abdul Ameer
Particle swarm optimization algorithm is easy to access premature convergence in the solution process, and also fall into the local optimal solution. The Bees algorithm is an inference optimization based on the foraging behavior of honey bees. It has been assured that this algorithm is able to search for global optimum, but there is one defect, it’s the fact that the global best solution is not used in a direct manner, but the Bees algorithm stores it of each iteration. We propose a new hybrid approach in order to address these problems, it is between Quantum particle swarm optimization and Bees algorithm based on 3D logistic map. On one hand, the 3D logistic map is employed for initializing uniform distributed particles so as to enhance the initial population quality, which is a very efficient yet simple method for improving the quality of initial population. On the other hand, the essence of this approach is the use Quantum particle swarm optimization for optimum fitness value of population in Bees algorithm. After determining the starting point in the new algorithm, the form of distribution is of circles with random angles and random diagonal where 3D logistic map generate the random numbers. The algorithm was applied for extracting the characteristics of the fingerprint, and the results when compared to the traditional particle swarm optimization algorithm were excellent.
Particle swarm optimization
Bees algorithm
D logistic map
Local optimal
Global optimum
2017
12
28
56
68
https://csm.iraqjournals.com/article_134694_473a4a32bbbcebf6a3b9d82868291428.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Plant layout design and assessment consideration of cellular manufacturing system via G.A
Dhurgham
Aiham Kadhim Alshakarchi
Maytham
Salman azeez
Cellular manufacturing is a wide world and many study and researches discussed are concerning with it because of the large demand in market and wheel technology push the scientist to find tools that can stand with this fast change in demand according specific market , so that they invent the best way to deal with optimization purpose. In this research the dealing with cellular optimization in such a way that can be manageable by AI and using type of AI that named natural optimization . The applying of genetic algorithms was carried out on factory of electrical motor also all data was taken from the factory which is depend on the position and sequence of operations took place in the factory . The theory in this field were also taking in consideration and the applications was carried out . the research deals with problem in two way theoretically that can take in consideration the positions of machines inside the plant and its equations that covers with some constraints and the secondly the routing of part during product life cycle and execute results and applying it on factory configuration . There are multi solutions (results ) in the research for the problem that can achieve the flexibility , simplicity and also desired distance
Cellular manufacturing
Genetic Algorithms
Optimization
layout
2017
12
28
69
77
https://csm.iraqjournals.com/article_134698_490ba1ba14816d04ccc79f627f3c5b22.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
New method for Increasing watermarked image quality and security
Rana
J.S. Al-janabi
Shroouq
J.S. Al-janabi
Zinah
Hussein Toman
Recently, information transmission is done electronically, information can be stored and manipulated easily using computer, information transferring should be done in secure way. Watermark is a technique that can be used to secure data.
In this paper, a new watermark algorithm is proposed which depends on integer wavelet transform, arithmetic encoding and adaptive run length encoding. Adaptive run length encoding is used to compress watermark before embedding process. Arithmetic encoding can be used to compress data in original image that are needed to be retrieved from watermarked images to recover original image without any differences after watermark extraction process.
To avoid the problem of traditional Run Length Encoding Technique that may produce file that is larger than original one. Adaptive run length encoding is suggested which is used to compress watermark in cover image. The adaptive compression technique can be done several times on watermark using different number of bits to represent counts of runs and produce several vectors for number of runs, compare several results and select smallest vector from them. Surely, the smallest vector means that watermarked image will be high quality image; capacity will be better and adaptively ensure embedding process will be more secure.
2017
12
28
78
85
https://csm.iraqjournals.com/article_134700_35f777c3336d64b6a84cd305732167b0.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Black Hole Attack in Mobile Ad Hoc Network and its Avoidance
Ali
Ayid Ahmad
Ahmed
Chalak Shakir
Mobile Ad Hoc Network is an infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.
MANET
DSR
DSSR
DoS
AODV
2017
12
28
86
96
https://csm.iraqjournals.com/article_134702_fec4839cff95daf2b65f0c322f797445.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Mammogram image with Wiener filter and CLAHE
Thekra
Abbas
M.Nafea
Jafaar
Many of the women in worlds die because of breast cancer and early detection will save the lives of many women. A mammogram is a special medical image in the breast. The mammogram image contains artifacts and wedge.
In this paper the mammogram image enhances by applied the Wiener filter to remove noise and apply Contrast Limited Adaptive Histogram Equitation (CLAHE) to improve a quality of mammogram image. Before applying them made number step to remove artifacts and wedge, background and pectoral muscle these know. The result indicted obtain mammogram image only breast profile, with a nice smooth, safe edge, and high quality.
These results prove that effective and convenient assistance for medical diagnosis. Hence, the proposed method definitely can be considered for automated detection of abnormality like benign, malignant and micro calcifications.
Breast Cancer
Contrast Limited Adaptive Histogram Equitation
mammogram
wiener filter
2017
12
28
97
102
https://csm.iraqjournals.com/article_134706_aee5ccc349afe44e9f8747b7530ce10b.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Mushroom Diagnosis Assistance System Based on Machine Learning by Using Mobile Devices
Intisar
Shadeed Al-Mejibli
Dhafar
Hamed Abd Dhafar Hamed Abd
Picking the wild mushrooms from the wild and forests for food purpose or for fun has become a public issue within the last years because many types of mushrooms are poisonous. Proper determination of mushrooms is one of the key safety issues in picking activities of it, which is widely spread, in countries. This contribution proposes a novel approach to support determination of the mushrooms through using a proposed system with mobile devices. Part of the proposed system is a mobile application that easily used by a user - mushroom picker. Hence, the mushroom type determination process can be performed at any location based on specific attributes of it. The mushroom type determination application runs on Android devices that are widely spread and inexpensive enough to enable wide exploitation by users.
This paper developed Mushroom Diagnosis Assistance System (MDAS) that can be used on a mobile phone. Two classifiers are used which are Naive Bays and Decision Tree to classify the mushroom types. The proposed approach selects the most effective of the already known mushroom attributes, and then specify the mushroom type. The use of specific features in mushroom determination process achieved very accurate results.
Android
Decision tree
Mushroom Determination
Mobile device
Naive Bays
2017
12
28
103
113
https://csm.iraqjournals.com/article_134709_f3719d09c07bc634642bede35230dd36.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Adaptive playfair cipher Crypto algorithm
Salam
Abdulkhaleq Noaman
A well known cryptographic techniques is Playfair Cryptography, it is considered one of the classical method. After the invention of different techniques, it is easy to break Playfair. This paper proposed some way for removal of the traditional Playfair drawbacks. The Adaptive playfair algorithm proposed in this paper, add more security and complexity to the classical playfair algorithm. In addition to the use of two keys in form of matrices to encrypt the message, the proposed method works depending on using the odd even positions for the every pairs of the letters. The odd pairs encrypt through the first matrix key and the even pairs encrypt by using the second matrix, then applying XOR function with the third key to the result. The resulting cipher text will be in binary form, the plain text obtained by run proposed step backwards.
Double keys
playfair
cipher text only attack
frequency attack
2017
12
28
114
121
https://csm.iraqjournals.com/article_144320_099d12c25d7fd58d27d25612d3087f29.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Efficient Neighborhood Function and Learning Rate of Self-Organizing Map (SOM) for Cell Towers Traffic Clustering
Haider
Kadhim Hoomod
Intisar
Al-Mejibli
Abbas
Issa Jabboory
The self-organizing map (SOM) neural network is based on unsupervised learning, and has found variety of applications. It is necessary to adjust the SOM parameters before starting learning process to ensure the best results. In this research, three types of data represent high and low traffic of specific cell tower with subscriber positions distribution in central of Iraq are investigated by self-organizing map (SOM). SOM functions and parameters influence its final results. Hence, several iteration of experiments are performed to test and analyze Bubble, Gaussian and Catgass neighborhood functions with three learning rates (linear, inverse of time and power series) and they were evaluated based on the quantization error. The experiments results show that Bubble function with linear learning rate gives the best result for clustering cell tower traffic.
SOM
Traffic
Cell Tower
LEARNING RATE
neighborhood functions
2017
12
28
122
130
https://csm.iraqjournals.com/article_144322_01989ae955296afb746a833bfe61e2e3.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Design of Intelligent Agent Based management security system for E-government
Dhyaa
Shaheed Al-Azzawy
Sinan
Adnan Diwan
E-Government delivers services into inhabitant electronically, action, and another government existence. This is analogous to document centric approach in traditional service delivery by the government. One of the most crucial factor regarding the reliability of government services is the security factor, which eventually leads to the social acceptance and satisfaction. E-Government is now a day is the response to the rapid development in the information technology especially in the automation of the process of service delivery. The model introduced by this paper is built over the social behavior of entities that shares the knowledge and provides decision-making baselines. Each entity is capturing its own knowledge and crystalize it with other entities within the communities. In this paper JAVA Agents where built to represent the individuals, which are attached to certain interaction points, for example each intelligent agent is attached to a web site representing the source of knowledge and behavior capture. Results proven that the social behavior of the software intelligent agent is a huge potential toward establishing social acceptance due to the smart behavior in collecting information regarding the utilization of the service, Three sites have been built along the implementation of paper to pursue its hypothesis; this is to represent government web sites deliver certain services and over which an intelligent agent is attached to capture the behavior of users and later on broadcast captured knowledge to other agents (i.e., the community is composed of four agents). The knowledge and expertise have been mutually exchanged and the overall knowledge has been proven to be converged toward the maximum experienced Agent.
government
government security
Agent system
Intelligent JAVA system
Intelligent Systems
2017
12
28
131
142
https://csm.iraqjournals.com/article_144325_fb658510ca95c0fc1ac1bfbf91d5bd8f.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Prediction by using Artificial Neural Networks and Box-Jenkins methodologies: Comparison Study
Emaan
Yousif Abdoon
Mohammed
Habib Al- Sharoot
The variations in exchange rate, especially the sudden unexpected increases and decreases, have significant impact on the national economy of any country. Iraq is no exception; therefore, the accurate forecasting of exchange rate of Iraqi dinar to US dollar plays an important role in the planning and decision-making processes as well as the maintenance of a stable economy in Iraq. This research aims to compare Box-Jenkins methodology to neural networks in terms of forecasting the exchange rate of Iraqi dinar to US dollar based on data provided by the Iraqi Central Bank for the period 30/01/2004 and 30/12/2014.
Based on the Mean Square Error (MSE), the Mean Absolute Error (MAE), and the Mean Absolute Percentage Error (MAPE) as criteria to compare the two methodologies, it was concluded that Box-Jenkins is better than neural network approach in forecasting.
Time series analysis
Autoregressive Moving Average models
Artificial Neural Network
Backpropagation algorithm
2017
12
28
1
16
https://csm.iraqjournals.com/article_144327_66efc86b3ad42692058a73f0877908e8.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2017
9
2
Prediction by using spectral analysis and artificial neural networks methodologies: Comparison Study
Emaan
Yousif Abdoon
Mohammed
Habib Al- Sharoot
The variations in exchange rate, especially the sudden unexpected increases and decreases, have significant impact on the national economy of any country. Iraq is no exception; therefore, the accurate forecasting of exchange rate of Iraqi dinar to US dollar plays an important role in the planning and decision-making processes as well as the maintenance of a stable economy in Iraq. This research aims to compare spectral analysis methodology to artificial neural networks in terms of forecasting the exchange rate of Iraqi dinar to US dollar based on data provided by the Iraqi Central Bank for the period 30/01/2004 and 30/12/2014.
Based on the Mean Square Error (MSE), the Mean Absolute Error (MAE), and the Mean Absolute Percentage Error (MAPE) as criteria to compare the two methodologies, it was concluded that is artificial neural networks better than spectral analysis approach in forecasting.
Time series analysis
spectral analysis
periodogram
Autoregressive Moving Average models
Artificial Neural Network
Backpropagation algorithm
2017
12
28
17
33
https://csm.iraqjournals.com/article_144328_7d860e572fa91591cfd6be04d2cb16c2.pdf