Volume 9, Issue 2, Autumn 2017, Page 1-147


Weak Armendariz Zero Knowledge Cryptosystem

Areej M. Abduldaim

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 1-6

Innovative idea using ring theory is raised to build a new algorithm for zero knowledge (ZK) cryptosystem. In this paper we introduce an algorithm for zero knowledge protocol based on a specific kind of rings named weak Armendariz. On the other hand, the aim of this paper focuses on the category of noncommutative algebraic structures to describe a new algebraic scheme of zero knowledge proof using weak Armendariz rings. As a result, we employ for the first time weak Armendariz rings in the science of cryptographic which regards as a new application of this class of rings. Finally, we present a novel idea combining between abstract algebra and cryptography.

On Fuzzy Measure on Fuzzy sets

Karrar S. Hamzah; Noori F. Al-Mayahi

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 7-12

In this paper, we study the fuzzy measure on fuzzy sets and prove some new properties.
Keywords: Fuzzy measure, semi continuous fuzzy measure, null additive fuzzy measure, fuzzy measure accountably weakly null-additive fuzzy measure.

On ms-Convergence of Nets and Filters

Fieras Joad Obead Al-Ysaary

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 17-25

"In this paper I'm introduce and study another type of convergence in a minimal structures namely Minimal Structure Convergence (ms-convergence) of nets and filters by using the concept of ms-open sets". "Also I'm investigate some properties of these concepts". "As well as I'm used two functions on the basis of Minimal structure in various forms, one check transmission character compacting minimal structure and other check transmission two characters compacting minimal structure and compact from one side depending on the requirements of research".

A New Subclass of Harmonic Univalent Functions

Najah Ali Jiben Al-Ziadi; Waggas Galib Atshan

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 26-32

In this paper, we define a new class of harmonic univalent functions of the form f=h+¯g in the open unit disk U. We obtain basic properties, like, coefficient bounds, extreme points, convex combination, distortion and growth theorems and integral operator.

Coefficients Bounds for a General Subclasses of m-Fold Symmetric Bi-Univalent Functions

Najah Ali Jiben Al-Ziadi; Waggas Galib Atshan

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 33-39

In this paper, we introduce and investigate a new general subclasses R_(Σ_m ) (τ,λ,η;α) and R_(Σ_m ) (τ,λ,η;β) of Σ_m consisting of analytic and m-fold symmetric bi-univalent functions in the open unit disk U. We obtain estimates on the Taylor-Maclaurin coefficients |a_(m+1) | and |a_(2m+1) |. Also, we obtain new special cases for our results.

SOME RESULTS ABOUT CORETRACTABLE MODULES

Shukur Neamah Al-aeashi; Inaam Mohammed Ali Hadi

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 40-48

Throughout this paper, all rings have identities and all modules are unitary right modules. Let R be a ring and M an R-module. A module M is called coretractable if for each proper submodule N of M, there exists a nonzero homomorphism f from M/N into M. Our concern in this paper is to develop basic properties of coretractable modules and to look for any relations between coretractable modules and other classes of modules.

Equivalent of permutation polytopes with applications

Batool A. Hameed; Shatha A. Salman

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 49-53

An open conjecture that relates to the equivalents between the permutation polytopes associated to their groups is proved and also the proof for two permutation groups which are effectively equivalent implies the permutation polytopes associated to these groups is combinatorial equivalent is given.

Rate of approximation of K-monotone functions in L_(ψ,p) (I) space , 0

Nada Zuhair Abd AL-Sada; Noor Hayder Abdul Ameer; Adel Salim Tayyah; Akeel Ramadan Mehdi; Dhurgham Aiham Kadhim Alshakarchi; Maytham Salman azeez; Emad Allawi Shallal; Saad Abdulkadhim Al-Saadi; Mehdi S. Abbas; Rana J.S. Al-janabi; Shroouq J.S. Al-janabi; Zinah Hussein Toman; Sarim H. Hadi; Noori F. AL-Mayahi; Ali Ayid Ahmad; Ahmed Chalak Shakir; Hassan Nadem Rasoul; Alaa Saleh Hadi; Ali Hassan Mohammed; Sara F. Hassan; Boushra Y. Hussein; Thekra Abbas; M.Nafea Jafaar; Hanadi A. AbdulSatter; Intisar Shadeed Al-Mejibli; Dhafar Hamed Abd Dhafar Hamed Abd; Salam Abdulkhaleq Noaman; Alaa H. Al-Muslimawi; Bashaeer K. Jassim; Haider Kadhim Hoomod; Intisar Al-Mejibli; Abbas Issa Jabboory; Farhan Dakhil Shyaa; Dhyaa Shaheed Al-Azzawy; Sinan Adnan Diwan; Ahmed Talip Hussein; Haider Jebur Ali; Habeeb Kareem Abdulla; Shatha S.Alhily

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 54-56

In this paper we shown that the relationship with the best algebraic approximation and K- monotone functions with bounded ( i ) such that (i

Keywords

Monotone functions
---
approximation
---
Modulus of smoothness.
---
الدالة المتناوبة
---
التقريب
---
مقياس النعومة .

SS-Injective Modules and Rings

Adel Salim Tayyah; Akeel Ramadan Mehdi

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 57-70

We introduce and investigate SS-injectivity as a generalization of both soc-injectivity and small injectivity. A right module M over a ring R is said to be SS-N-injective (where N is a right R-module) if every R-homomorphism from a semisimple small submodule of N into M extends to N. A module M is said to be SS-injective (resp. strongly SS-injective), if M is SS-R-injective (resp. SS-N-injective for every right R-module N). Some characterizations and properties of (strongly) SS-injective modules and rings are given. Some results on soc-injectivity are extended to SS-injectivity.

(Quasi-)Injective Extending Gamma Modules

Emad Allawi Shallal; Saad Abdulkadhim Al-Saadi; Mehdi S. Abbas

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 71-80

In this paper we introduce and study the concept of injective (Quasi-injective) extending gamma modules as a generalization of injective (Quasi-injective) gamma modules. An R_Γ-module E is called injective (Quasi-injective) extending gamma modules if each proper R_Γ-submodule in E is essential in injective (Quasi-injective) R_Γ-submodule of E. The concept of injective extending gamma modules lie between injective gamma modules and quasi-injective gamma modules.

B-C^* algebra Metric Space and Some Results Fixed point Theorems

Sarim H. Hadi; Noori F. AL-Mayahi

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 81-87

On the aim and properties of C^*- algebra, in this paper we introduce the two concepts B-C^* algebra and B-C^*algebra metric space as well as introduce concept convergent and Cauchy sequence in space and to study the existence of fixed point theorems with contraction condition and B-C^* algebra expansion on this space.

Integration of the Al-Tememe Transformation To find the Inverse of Transformation And Solving Some LODEs With (I.C)

Hassan Nadem Rasoul; Alaa Saleh Hadi; Ali Hassan Mohammed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 88-93

Our aim in this paper is to find the integration of Al-Tememe (T) transformation to help us in finding (〖 T〗^(-1)) for some functions without using of partition method and solve linear ordinary differential equations (LODEs) with variable coefficients by using (I.C) .

The Condition Order Spectrum

Sara F. Hassan; Boushra Y. Hussein

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 94-102

In this paper, we will study the relation between complex character f and the condition order spectrum 〖SP〗_ε (a) in real and complex ordered Banach algebra A .We prove many properties on it,s . afterwards, we prove that 〖SP〗_ε (a) is upper semi continuous Finally we will show the relation between condition Quasinilpotent 〖QN〗_ε (A) and the radical .

On approximation f by (α,β,γ)-Baskakov Operators

Hanadi A. AbdulSatter

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 103-114

In the present paper, we study some application properties of the approximation for the sequences M_(n,γ)^(α,β) (f;x) and B_(n,γ)^(α,β) ( f; x ). These sequences depend on the arbitrary (but fixed) parameters α,β and γ. Here, we study the effect of these parameters on tends speed of the two families of operators M_(n,γ)^(α,β) (f;x) and B_(n,γ)^(α,β) ( f; x ) and the CPU times which are occurring on the approximation by a choosing fixed n.

Numerical analysis of Newtonian flows based on artificial compressibility AC method

Alaa H. Al-Muslimawi; Bashaeer K. Jassim

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 115-128

In this study, numerical analysis for incompressible Newtonian flows has been conducted by using an artificial compressible method ( -method) based on the Galerkin finite element approach. As well known, Naiver-Stoke partial differential equations are employed to describe activity of the fluid. This model, which consists of two differential equations; named the conservation of mass and time-dependent conservation of momentum is presented in cylindrical coordinates system (Axisymmetric flow). The effects of many factors such as Reynolds number ( ) and artificial compressibility parameter ( ) are discussed in the present study. In particular, this study emphasized on the impact of these parameters on the level of convergence. To satisfy the analysis of the method, Poiseuille flow along a circular conduit under isothermal condition is utilized as a simple test problem. This test is conducted by taking a circular cross section of pipe.

T-semimaximal submodules

Farhan Dakhil Shyaa

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 129-133

In this paper, we define and study the notions of t-semimaximal submodule as a generalization of semimaximal submodule. We provided many properties and characterizations of this concept are provided.

Limit Sets and Cartan D – space

Ahmed Talip Hussein; Haider Jebur Ali; Habeeb Kareem Abdulla

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 134-140

The main goal of this work is to create a general type of D – space , namely, Cartan D – space and a new type of limit sets , namely, limit sets , and, give some properties and some equivalent statement of these concept also we explain the relationship among the definitions Cartan D – space and ,

Close-to-convex Function Generates Remarkable Solution of 2^nd order Complex Nonlinear Differential Equations

Shatha S.Alhily

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 141-147

Consider the complex nonlinear differential equation f^'' (z)-2/z f^' (z)-2/z^2 f^3 (z)= H(z) , where P(z)= (-2)/z,Q(z)=(-2)/z^2 are complex coefficients, and H(z) be a complex function performs non- homogeneous term of given equation.
In this paper, we investigated that w(z)=(zf^')/f is a remarkable solution of given equation and belongs to hardy space H^2 ; with studying the growth of that solution by two ways ; through the maximum modulus and Brennan’s Conjecture and another by finding the supremum function of a volume of the surface area 〖K 〗_θ. Furthermore, we discussed the solution behaviour with meromorphic coefficients properties for given equation.

Robust and Secured Image Steganography using LSB and Encryption with QR Code

Hazim Noman Abed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 1-9

The great development obtained with digital communication system depends on the improvement of the amount and security of transmitting information, the secrecy of data transmitted becomes a main subject for the researcher. Cryptography and Steganography play a major role for secured data transfer. In this research, the cryptography and steganography method was proposed for information security. In cryptography, the encrypted message was obtained by XOR the secret message with QR code. While, in Steganography the encrypted message was embedded inside cover image using LSB technique. The new approach in this research is use of the QR technique as well as the encrypted message was hidden in places selected using the bat algorithm. Secret message with different sizes was tested with many cover imagesto verify the efficiency of the proposed method. In the end, to measure the quality of cover image after the process of embedding, a group of standard parameters has adopted. The results of parameters showed the proposed method hasthe highest security and integrity.

The effect of random waypoint mobility infrastructure for wireless networks

Aseil nadhum kadhum; Aseel nadhum kadhum

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 10-18

Mobile wireless sensor networks (mwsns) have as of late propelled a developing well known class of wsn in which portability assumes a key part in the execution of the application. As of late, portability has turned into an imperative zone of research for the wsn group. The expanding abilities and the diminishing expenses of portable sensors make versatile sensor systems conceivable and viable. In spite of the fact that wsn organizations were never imagined to be completely static, portability was at first viewed as having a few difficulties that should have been defeat, including availability, scope, and vitality utilization, among others. be that as it may, late studies have been indicating versatility in a more ideal light. In this article, an outline of proposition that assess portable correspondence in wsns is exhibited.

Accordingly ,an assortment of versatility were proposed by analysts throughout the years where every portability display has its own particular properties that may influence the execution of the system in a way that varies from different models entitled with various properties. In this paper we give a study of versatility models that can be utilized as a part of remote sensor systems since it is imperative to give an arrangement of the accessible models along these lines a few portability models were looked into in the proposed work.

Convert 2D shapes in to 3D images

Rasha falah; Rafeef mohammed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 19-23

There are several complex programs that using for convert 2D images to 3D models with difficult techniques. In this paper ,it will be introduce a useful technique and using simple Possibilities and language for converting 2D to 3D images. The technique would be used; a three-dimensional projection using three images for the same shape and display three dimensional image from different side and to implement the particular work, visual programming with 3Dtruevision engine would be used, where its given acceptable result with shorting time. And it could be used in the field of engineering drawing.

E-Management System of Kirkuk University Based on Distributed Database

Banaz Anwer Qader; Kamal Hasan Jihad; Yalmaz Najm Alddeen Taher

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 24-34

This research includes an analytical study of the administrative and scientific work in departments, branchs and units of the Kirkuk University Presidency. It aims to convert the traditional routine work to the electronic work at the university by applying E-Management technique as one of the required modern logical solutions most commonly used to facilitate the difficulty of managing the vast amount of documents and delaying workflow that facing most institutions and organizations. In view of the increasing and urgent need for the use of E-Management systems throughout all the departments of the university presidency, the Electronic Distributed Kirkuk University Management System (E-DKUMS) is designed by using of Distributed Databases (DDB) technique, as well as using of electronic network infrastructure (LAN) that connects all the university configurations. The results of system implementation demonstrated that it is distinguished with high performance and speed, very high reliability and security, as well as very few employment cost. Test and evaluation results proved the ability of the system to facilitate the progress of managerial functions, reduce the time and effort, and capability of restructuring the administrative structure because of its excellence with flexibility in the creation and deletion departments, branches, and units for the system; in addition to easily troubleshot and fast execution.

Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques

Ghadah Al-Khafaji; Shaymaa Fadhil

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 35-44

Image compression is a serious issue in computer storage and transmission, that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information
Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the mathematical model and the residual.
In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless compression scheme of first stage that corresponding to second stage.
The tested results shown are promising in both two stages, that implicilty enhanced the performance of traditional polynomial model in terms of compression ratio , and preresving image quality.

A Proposed Model for the Mutual Dependency Between QoE and QoS in Wireless Heterogeneous Networks

Hasan F. Khazaal; Rawaa I. Farhan; Baraa I. Farhan; Haider Th. Salim ALRikabi; Stavros Kotsopoulos; Stavros Kotsopoulos

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 45-55

Streaming of video over wireless heterogeneous networks coping with the problem of packet loss which affects the perceived video quality. The service providers usually use the Peak Signal to Noise Ratio PSNR as a metric measure for the quality of their provided service. So they use the quality of service QoS of the network as a sign on the quality of their presented service. The QoS deal with the objective tests of the provided service, which mean the measure of PSNR of the presented objects. The presented objects may not get the satisfaction of the network users due to many factors although that the PSNR of the used service is enough for presenting the service. Recently the service providers use the Quality of Experience QoE term which deal with the subjective test of the presented object (i.e. the user satisfaction measure). In this paper we propose a new model to identify the importance or the significance of the role of the QoE assessment for the service providers. To verify our proposed model we did a referendum for 55 participants in order to assess their judgment on the quality of some presented videos. The results of the referendum match the consideration of the proposed model.

Finger print Feature Extraction Using Hybrid Approach: QPSO and Bees Algorithms Based on 3D Logistic Map

Noor Hayder Abdul Ameer

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 56-68

Particle swarm optimization algorithm is easy to access premature convergence in the solution process, and also fall into the local optimal solution. The Bees algorithm is an inference optimization based on the foraging behavior of honey bees. It has been assured that this algorithm is able to search for global optimum, but there is one defect, it’s the fact that the global best solution is not used in a direct manner, but the Bees algorithm stores it of each iteration. We propose a new hybrid approach in order to address these problems, it is between Quantum particle swarm optimization and Bees algorithm based on 3D logistic map. On one hand, the 3D logistic map is employed for initializing uniform distributed particles so as to enhance the initial population quality, which is a very efficient yet simple method for improving the quality of initial population. On the other hand, the essence of this approach is the use Quantum particle swarm optimization for optimum fitness value of population in Bees algorithm. After determining the starting point in the new algorithm, the form of distribution is of circles with random angles and random diagonal where 3D logistic map generate the random numbers. The algorithm was applied for extracting the characteristics of the fingerprint, and the results when compared to the traditional particle swarm optimization algorithm were excellent.

Plant layout design and assessment consideration of cellular manufacturing system via G.A

Dhurgham Aiham Kadhim Alshakarchi; Maytham Salman azeez

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 69-77

Cellular manufacturing is a wide world and many study and researches discussed are concerning with it because of the large demand in market and wheel technology push the scientist to find tools that can stand with this fast change in demand according specific market , so that they invent the best way to deal with optimization purpose. In this research the dealing with cellular optimization in such a way that can be manageable by AI and using type of AI that named natural optimization . The applying of genetic algorithms was carried out on factory of electrical motor also all data was taken from the factory which is depend on the position and sequence of operations took place in the factory . The theory in this field were also taking in consideration and the applications was carried out . the research deals with problem in two way theoretically that can take in consideration the positions of machines inside the plant and its equations that covers with some constraints and the secondly the routing of part during product life cycle and execute results and applying it on factory configuration . There are multi solutions (results ) in the research for the problem that can achieve the flexibility , simplicity and also desired distance

New method for Increasing watermarked image quality and security

Rana J.S. Al-janabi; Shroouq J.S. Al-janabi; Zinah Hussein Toman

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 78-85

Recently, information transmission is done electronically, information can be stored and manipulated easily using computer, information transferring should be done in secure way. Watermark is a technique that can be used to secure data.
In this paper, a new watermark algorithm is proposed which depends on integer wavelet transform, arithmetic encoding and adaptive run length encoding. Adaptive run length encoding is used to compress watermark before embedding process. Arithmetic encoding can be used to compress data in original image that are needed to be retrieved from watermarked images to recover original image without any differences after watermark extraction process.
To avoid the problem of traditional Run Length Encoding Technique that may produce file that is larger than original one. Adaptive run length encoding is suggested which is used to compress watermark in cover image. The adaptive compression technique can be done several times on watermark using different number of bits to represent counts of runs and produce several vectors for number of runs, compare several results and select smallest vector from them. Surely, the smallest vector means that watermarked image will be high quality image; capacity will be better and adaptively ensure embedding process will be more secure.

Black Hole Attack in Mobile Ad Hoc Network and its Avoidance

Ali Ayid Ahmad; Ahmed Chalak Shakir

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 86-96

Mobile Ad Hoc Network is an infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.

Mammogram image with Wiener filter and CLAHE

Thekra Abbas; M.Nafea Jafaar

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 97-102

Many of the women in worlds die because of breast cancer and early detection will save the lives of many women. A mammogram is a special medical image in the breast. The mammogram image contains artifacts and wedge.
In this paper the mammogram image enhances by applied the Wiener filter to remove noise and apply Contrast Limited Adaptive Histogram Equitation (CLAHE) to improve a quality of mammogram image. Before applying them made number step to remove artifacts and wedge, background and pectoral muscle these know. The result indicted obtain mammogram image only breast profile, with a nice smooth, safe edge, and high quality.
These results prove that effective and convenient assistance for medical diagnosis. Hence, the proposed method definitely can be considered for automated detection of abnormality like benign, malignant and micro calcifications.

Mushroom Diagnosis Assistance System Based on Machine Learning by Using Mobile Devices

Intisar Shadeed Al-Mejibli; Dhafar Hamed Abd Dhafar Hamed Abd

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 103-113

Picking the wild mushrooms from the wild and forests for food purpose or for fun has become a public issue within the last years because many types of mushrooms are poisonous. Proper determination of mushrooms is one of the key safety issues in picking activities of it, which is widely spread, in countries. This contribution proposes a novel approach to support determination of the mushrooms through using a proposed system with mobile devices. Part of the proposed system is a mobile application that easily used by a user - mushroom picker. Hence, the mushroom type determination process can be performed at any location based on specific attributes of it. The mushroom type determination application runs on Android devices that are widely spread and inexpensive enough to enable wide exploitation by users.
This paper developed Mushroom Diagnosis Assistance System (MDAS) that can be used on a mobile phone. Two classifiers are used which are Naive Bays and Decision Tree to classify the mushroom types. The proposed approach selects the most effective of the already known mushroom attributes, and then specify the mushroom type. The use of specific features in mushroom determination process achieved very accurate results.

Adaptive playfair cipher Crypto algorithm

Salam Abdulkhaleq Noaman

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 114-121

A well known cryptographic techniques is Playfair Cryptography, it is considered one of the classical method. After the invention of different techniques, it is easy to break Playfair. This paper proposed some way for removal of the traditional Playfair drawbacks. The Adaptive playfair algorithm proposed in this paper, add more security and complexity to the classical playfair algorithm. In addition to the use of two keys in form of matrices to encrypt the message, the proposed method works depending on using the odd even positions for the every pairs of the letters. The odd pairs encrypt through the first matrix key and the even pairs encrypt by using the second matrix, then applying XOR function with the third key to the result. The resulting cipher text will be in binary form, the plain text obtained by run proposed step backwards.

Efficient Neighborhood Function and Learning Rate of Self-Organizing Map (SOM) for Cell Towers Traffic Clustering

Haider Kadhim Hoomod; Intisar Al-Mejibli; Abbas Issa Jabboory

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 122-130

The self-organizing map (SOM) neural network is based on unsupervised learning, and has found variety of applications. It is necessary to adjust the SOM parameters before starting learning process to ensure the best results. In this research, three types of data represent high and low traffic of specific cell tower with subscriber positions distribution in central of Iraq are investigated by self-organizing map (SOM). SOM functions and parameters influence its final results. Hence, several iteration of experiments are performed to test and analyze Bubble, Gaussian and Catgass neighborhood functions with three learning rates (linear, inverse of time and power series) and they were evaluated based on the quantization error. The experiments results show that Bubble function with linear learning rate gives the best result for clustering cell tower traffic.

Design of Intelligent Agent Based management security system for E-government

Dhyaa Shaheed Al-Azzawy; Sinan Adnan Diwan

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 131-142

E-Government delivers services into inhabitant electronically, action, and another government existence. This is analogous to document centric approach in traditional service delivery by the government. One of the most crucial factor regarding the reliability of government services is the security factor, which eventually leads to the social acceptance and satisfaction. E-Government is now a day is the response to the rapid development in the information technology especially in the automation of the process of service delivery. The model introduced by this paper is built over the social behavior of entities that shares the knowledge and provides decision-making baselines. Each entity is capturing its own knowledge and crystalize it with other entities within the communities. In this paper JAVA Agents where built to represent the individuals, which are attached to certain interaction points, for example each intelligent agent is attached to a web site representing the source of knowledge and behavior capture. Results proven that the social behavior of the software intelligent agent is a huge potential toward establishing social acceptance due to the smart behavior in collecting information regarding the utilization of the service, Three sites have been built along the implementation of paper to pursue its hypothesis; this is to represent government web sites deliver certain services and over which an intelligent agent is attached to capture the behavior of users and later on broadcast captured knowledge to other agents (i.e., the community is composed of four agents). The knowledge and expertise have been mutually exchanged and the overall knowledge has been proven to be converged toward the maximum experienced Agent.

Prediction by using Artificial Neural Networks and Box-Jenkins methodologies: Comparison Study

Emaan Yousif Abdoon; Mohammed Habib Al- Sharoot

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 1-16

The variations in exchange rate, especially the sudden unexpected increases and decreases, have significant impact on the national economy of any country. Iraq is no exception; therefore, the accurate forecasting of exchange rate of Iraqi dinar to US dollar plays an important role in the planning and decision-making processes as well as the maintenance of a stable economy in Iraq. This research aims to compare Box-Jenkins methodology to neural networks in terms of forecasting the exchange rate of Iraqi dinar to US dollar based on data provided by the Iraqi Central Bank for the period 30/01/2004 and 30/12/2014.
Based on the Mean Square Error (MSE), the Mean Absolute Error (MAE), and the Mean Absolute Percentage Error (MAPE) as criteria to compare the two methodologies, it was concluded that Box-Jenkins is better than neural network approach in forecasting.

Prediction by using spectral analysis and artificial neural networks methodologies: Comparison Study

Emaan Yousif Abdoon; Mohammed Habib Al- Sharoot

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2017, Volume 9, Issue 2, Pages 17-33

The variations in exchange rate, especially the sudden unexpected increases and decreases, have significant impact on the national economy of any country. Iraq is no exception; therefore, the accurate forecasting of exchange rate of Iraqi dinar to US dollar plays an important role in the planning and decision-making processes as well as the maintenance of a stable economy in Iraq. This research aims to compare spectral analysis methodology to artificial neural networks in terms of forecasting the exchange rate of Iraqi dinar to US dollar based on data provided by the Iraqi Central Bank for the period 30/01/2004 and 30/12/2014.
Based on the Mean Square Error (MSE), the Mean Absolute Error (MAE), and the Mean Absolute Percentage Error (MAPE) as criteria to compare the two methodologies, it was concluded that is artificial neural networks better than spectral analysis approach in forecasting.