Volume 10, Issue 3, Autumn 2018, Page 13-16


Hybrid Approach to Detect Spam Emails using Preventive and Curing Techniques

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 16-24

A file that has to be moved between two schemes can be moved through the network. Security needed between the sender and the receiver. Electronic mails are fastest way of communication and information sharing, but in new years, Email system has been changed, which known Spam Mails. Spam is information, which is spread to a big number of receivers without telling them. Now, a number of techniques have been proposed to stop spam. Filters for anti-spam can be worked in two methods: Preventive techniques and Curing Techniques; The Preventive techniques are Stop Spam before delivery which are depend on URL Based and List Based. Such as whitelisting, blacklisting. The Curing Technique is Destination Spam Filtering that used is Content Based Filtering. The Curing Technique, the messages are categorized as Spam or not Spam based on these techniques. Such as Bayesian filtering, keyword-based filtering, heuristic-based filtering, etc. In this study introduce combining preventive techniques and curing
techniques to get good algorithm.

Three-dimensional Face Reconstruction using 3D Morphable Model Fitting Method

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 25-37

In this paper, the reconstruction of faces in the form of a 3D model from unconstrained images (different in pose) has been studied. Three-dimensional Morphable Model(3DMM)
Fitting method has been used in 3D reconstruction techniques. In this paper propose improvement of the 3DMM fitting procedure to get accurate 3D model by taking best 2D
landmark of all images rather than taking only first 2D image landmark (traditional method which proposed by A.Bas et al). The results of the proposed algorithm show its
very encouraging as far as execution time and quality of reconstruction as shown in compare the improvement fitting process with the traditional method.

New Results on Soft Spectral in Soft Banach Algebra

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 1-7

In this paper, concepts of soft character, soft division algebra, soft ideal, soft
maximal ideals are introduced .Soft Spectral Radius Formula are introduced and
proved, some properties of Soft gelfand algebra are proved.

Proof of Stronger Goldbach Conjecture

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 16-19

The stronger (binary) Goldbach conjecture expresses that "every even integer greater
than or equal to can be written as a sum of two odd prime numbers". The introduce
paper demonstrates this conjecture by proven that there exists a positive integer for each
integer number such that and are simultaneously primes.

Coefficient Estimates for Subclasses of Bi-Univalent Functions

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 20-26

In the present paper, we introduce two new subclasses of the class consisting of analytic and
bi-univalent functions in the open unit disk . Also, we obtain the estimates on the TaylorMaclurin coefficients | | and | | for functions in these subclasses. We obtain new special
cases for our results.

Properties of Compact fuzzy Normed Space

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 27-34

In this paper we recall the definition of fuzzy norm then basic properties of fuzzy
normed space is recalled after that we introduced the definition of compact fuzzy
normed space. Then basic properties of compact fuzzy normed space is proved.

Generalizing of Finite Difference Method for Certain Fractional Order Parabolic PDE’s

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 41-53

Space-time fractional differential equation with integral term (S-TFDE) has been considered.
The finite difference method (implicit and explicit) combined with the trapezoidal integration formula has been
used to
find special formula to solve this equation. The stability and convergence have been discussed. The effect of
adding an
integral term to the common classical equation has been considered. Graphical representation of the calculate
solutions
(obtained by the explicit and the implicit methods) for three numerical examples with their exact solution, are
considered. All the calculations and graphs are designed with the help of MATLAB.

Certain Types of Complex Lie Group Action

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 54-62

The main aim in this paper is to look for a novel action with new properties on from the
, the Literature are concerned with studying the action of of two
representations , one is usual and the other is the dual, while our interest in this work is focused on some actions
on complex Lie group[10] . Let G be a matrix complex group , and is representation of In this study we
will present and analytic the concepts of action of complex group on We recall the
definition of tensor product of two representations of group and construct the definition of action of
group on , then by using the equivalent relation ( ) between and
, we get a new action : – The two actions
are forming smooth representation of [ ] [ ] This we have new action which called
denoted by which acting on
( (( ) ) ( ))
This is smooth representation of The theoretical Justifications are developed and prove supported by
some concluding remarks and illustrations.

Anti – fuzzy AT – ideals of AT – algebras

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 63-72

In this paper , we introduce the notion of in , several
appropriate examples are provided and their some properties are investigated. The image and
the inverse image of in are defined and how
the of in become anti-fuzzy AT-ideals are studied. Moreover, the Cartesian Product of anti-fuzzy AT-ideals are given.

Trivial Extension of Armendariz Rings and Related Concepts

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 73-79

This paper investigate the possibility of inheriting the properties of the ring R to the trivial extension ring
R(R,R) and present the relationship between the trivial extension R(R,R) and many types of rings. The concepts
of 2-primal, reversible, central reversible, semicommutative, nil–semicommutative, π-Armendariz and central
π-Armendariz rings are studied with trivial extension R(R,R) and some characterizations of -Armendariz and
central π-Armendariz rings are given.

Topology Fuzzy Normed Algebra

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 35-40

In this paper, we deal with the basic concepts in topology on fuzzy normed algebra, such as the balls open and
balls closed. Next, we study their properties. Furthermore, the concept of derived and closure are discussed.

Analysis of Heat and Mass Transfer in a Tapered Asymmetric Channel During Peristaltic Transport of (Pseudoplastic Nanofluid) with Variable Viscosity Under the Effect of (MHD)

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 80-96

In this paper, a study and an analysis of a heat and mass transfer during peristaltic flow for a pseudoplastic
fluid in asymmetric tapered channel, and a variable viscosity dependent of a fluid temperature with exist of slip
conditions through porous medium and the influence of this conditions on the velocity and pressure, where the
wavelength of the peristaltic flow is a long and the Reynold number is very small. The solution of equations for
the momentum and energy have been on the basis of a perturbation technique for a found the stream function,
velocity, pressure gradient and temperature and also have been discussed the trapping phenomenon by the graphs.

On the NBC-Bases of product hypersolvable arrangements

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 108-117

This paper aims centered around the product of hypersolvable arrangements by using the hypersolvable partition analogue by proving that each of
A and B are hypersolvable if A × B is a hypersolvable, also each of A and B are supersolvable if A × B is supersolvable. Moreover, this paper show how to prove that the dimension of the first non-vanishing higher homotopy groups of the complement M(A × B) is p(A × B)× min{p(A), p(B)}.

Some Properties of Random Fixed Points and Random Periodic Points for Random Dynamical Systems

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 118-126

Our aim in this paper is to give some properties for random fixed points for random
dynamical systems where we give the characteristic of random fixed points in terms of the
random trajectory emanating from random variable and give. Also, the concept of random
periodic points for random dynamical systems is studied where the sufficiently and necessarily
conditions which make the random variable random periodic point for random dynamical
systems. Also the authors prove that the set of all (continuous) random periodic points under
certain conditions is P-closed.

Exact Solutions for nonlinear partial differential equation by modified F-expansion method

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 127-131

In this Paper, we use modified F-expansion method to construct new exact traveling wave solutions of nonlinear partial differential equation, The (2+1) – dimensional zoomeron equation, The obtained solutions include soliton – like solutions, trigonometric function solutions, rational solutions and exponential solutions.

On Minimal and Maximal T1 –space Via Β* c-open set

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 132-140

In this paper, we introduced study about properties of the spaces minimal T1 – Space and maximal T1 – space by using the set open (respace β - open, Β* c– open) sets and we concluded some propositions, remarks and relations between spaces m Β* c – T1 space and M Β * c – T1 space and study the relation between m – space and M – space to space T1 – space. Where we find every m Β* c – T1 space is M Β* c – T1 space, but the converse is not true in general. Also we introduced hereditary properties and topological properties.

A Class of Small Injective Modules

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 141-150

Let R be a ring. In this paper, a right R-module M is defined to be AS-injective if Ext1 (R ⁄K, M )=0 , for any annihilator-small right ideal K of R . We characterize rings over which every right module is AS-injective. Conditions under which the class of AS-injective right R-modules (ASIr ) is closed under quotient (resp. pure submodules, direct sums) are given. Finally, we study the definability of the class ASIr.

Design and Construct Intelligent Tank “Water Level Sensor”

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 1-8

The system proposed in this paper design a system of intelligent reservoir " water level sensor" helps reduce thewaste percentage of water. Through the automatic control and control of the water level by determining the water proportion of the reservoir in terms of emptiness and fullness and is carried out using the concept of artificial intelligence with micro controls, where the use of a simple and cheap control is arduino and is stored and stored information is written in IDL program to determine the percentage of fullness and lack Depending on the need of the user of the reservoir with the management of electronic parts associated with the Arduino to fill the tank when it is free of water and stop the filling process when reaching the specified level of fullness while monitoring the level of water during use. This system can be applied at the level of tanks reservoirs Cities and irrigation tanks and reservoirs for agricultural land with the development of electronic parts used in the control system to achieve the desired goal in preserving the amount of safe water for drinking and non-potable.

Estimating the state of website security as poorly regulated mechanisms based on fuzzy logic methods

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 9-15

The research is devoted to the analysis of page loading time, which is an important indicator for any web-site. As a rule, the sites are hosted on web-servers with certain characteristics. The users interact with the environment is largely aggressive and uncertain (external threats such as penetration, denial of service, the introduction of code into the language of structured SQL queries, etc.). It should be noted that there are the uncertainties generated by hardware and software are also important. Any site can be subis
influenced by the influence of the external environment and various subsystems of servicing the functions of web-sites, which leads to occurrence of contingencies and generates uncertainty of his work. The degree of uncertainty is cannot always be assessed on the basis of statistical material alone. This leads to an increase in the number of methods and means of intellectualizing the performance of evaluations on the basis of methods of artificial intelligence, and methods based on the use of fuzzy estimates. The assessment of the security status of Internet sites as poorly formalized objects on the basis of fuzzy logic methods considered in the article is implemented in the form of technology for assessing the states of reliability of a web site. The proposed approach allows a more flexible adaptation to the particular problem and allows diagnosis object already in the step of calculating an integral index of reliability. Flexibility is achieved due to the fact that the state of reliability can be estimated At once on several reliability indicators.

Methods of Secure Routing Protocol in Wireless Sensor Networks

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 38-55

The Wireless Sensor networks (WSN) consider an emerging technology that have been greatly employed in critical situations like battlefields and commercial applications such as traffic surveillance, building habitat, smart homes and monitoring and many more scenarios. Security is one of the main challenges that face wireless sensor networks nowadays. While an unattended environment makes the deployment of sensor nodes in the networks more vulnerable to vary of potential attacks, the limitations of inherent power and memory for the sensor nodes makes conventional solutions of the security is unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

Identification based Dental Image

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 56-69

Identification (matching) system is a recognition and classification form that helps in identifying the identity depending on his/her dental X-Ray image. This work displays a new method to identify a person from his/her dental X-Ray image that is widely used in forensic, border organization, parenting selecting and investigations. The goal of this paper is to design an efficient identification model depending on dental X-Ray image of identities and that can be useful to identify the unknown Individuals who died. The techniques that used were image processing and features extraction techniques which had been added to improve the goal. The best result attained from the dental X-Ray model was 89% as an identification rate.

Security Systems Based On Eye Movement Tracking Methods

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 70-78

This survey presents an overview of eye-tracking techniques for various security systems, provides insights into using eye-tracking techniques in security systems. This paper classifies the techniques using some researches. Researches depend on characteristics of eye tracking data, which includes viewer and stimuli aspects, also it does depend on characteristics related to visualization methods. This work contributed in explain some of the security systems that depend on eye gaze tracking, the
consequences, the positive and negative aspects resulting from the use of eye gaze tracking in the security system, presents the strengths and weaknesses to keep in mind in future. The work finally presents a comparison between those security systems for facilitating choose the more accurate and effective system.

Proposed aspect extraction algorithm for Arabic text reviews

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 79-90

Opinion mining from reviews is a very crucial area in NLP. This area has many applications in social networks, business intelligence, and decision making. Aspect extraction is the main step to achieve opinion mining. This paper proposed an algorithm for aspect extraction from reviews in the Arabic language, to determine the aspects that the reviewers are described in their comments. The proposed algorithm begins with analyzing the comments dataset using latent Dirichlet analysis (LDA) to identify the aspects and its
essential representative words, then extracting nouns and its' adjectives as a possible aspect phrase in a review. After that the categorizing process to categorize the extracted
phrases according to the words specified from LDA analysis. The proposed approach has been tested by using two standard Arabic reviews datasets. The result was auspicious in
spite of the difficulties if the Arabic natural language processing.

Design of keystream Generator utilizing Firefly Algorithm

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 91-99

Stream cipher is one of encryption procedures for sending data in internet; stream cipher is suitable in telecommunications and real-time apps. The robustness measurement of stream cipher is according to the randomness of keystream that is utilized. If the random series of keystream generator is low, the keystream of stream cipher can be read and encrypted data by stream cipher become vulnerable to attackers. This paper utilizes Firefly Algorithm based Local Key Generation for generation keystream. The generated keystream is independent of original messages. The randomness of keystream series of Firefly passing the five standard criteria. The suggested keystream generator is wordestablished appropriated to fast real-time apps than are bit-established linear stream ciphers. Furthermore, the suggested keystream generator satisfies the three demands of benchmarks such as maximum correlation, robust randomness and huge complexity.

Forecast the exchange rate of the Iraqi dinar against the US dollar using different versions of GARCH models.

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages 1-13

There are many time series that are characterized by large variability, which makes them suffer from the problem of heterogeneity of contrast clearly, Where
the time series analysis requires the homogeneity of variance for this purpose was the study and review of some important models used in dealing with the time
series heterogeneous in contrast, a GARCH, ARMA-GARCH,TGARCH, EGACH , When the distribution of errors follows the normal distribution which was discovered by Engle since 1982, The aim of this study was to forecast . This study aimed at forecasting the exchange rates of the Iraqi dinar against the US dollar for the period from 2010 to 2018 through an analysis of fluctuations in the exchange rate series. The application of the studied data showed that the best model for predicting volatility is ARMA (0-1) -GARCH 2.1) based on some
criteria for selecting the AIC, SIC, H-QIC and the significance of the estimated model parameters