Volume 10, Issue 1, Spring 2018, Page 1-109

Some Properties of Fuzzy AB-ideal of AB-algebras

Areej Tawfeeq Hameed; Baneen Najah Abaas

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 1-7

In this research we have introduced the concept of fuzzy AB-ideal of AB-algebra and also we proved some relevant characteristics and theories. We also studied the fuzzy relations on AB-algebras and fuzzy derivations AB-ideals. We presented the characteristics and theories that illustrat the two concepts that is promted us to study Cartesian Product of fuzzy derivations AB-ideals.

On The Enumeration of The Transitive and Acyclic Digraphs Having a Fixed Support Set

Dzhabri; Khalid Shea Khairalla Al

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 15-25

In previous works of the author, the concept of a binary reflexive adjacency relations was introduced on the set of all binary relations of the set , and an algebraic system consisting of all binary relations of the set and of all unordered pairs of adjacent binary relations was defined. If is a finite set, then this algebraic system is a graph (graph of binary relations ). The current paper introduces the notion of a support set for acyclic and transitive digraphs. This is the collections and consisting of the vertices of the digraph that have zero indegree and zero outdegree, respectively. It is proved that if is a connected component of the graph containing the acyclic or transitive digraph , then . A formula for the number of acyclic and transitive digraphs having a fixed support set is obtained.

Dihedral Cryptographic Technique

Zainab Fahad Mhawes

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 26-31

This paper focuses on a new technique of cryptography in abstract algebra. We first give the necessary review on Dihedral group and cryptography .We definition a new alphabetic of characters by additive character “blank” ,thus we have (27) characters {26 letters and “blank” },therefore we use modular 27 instead 26 such that we use the reflection and rotation which exists in Dihedral group to change the arrange of vectors of characters in plain text.

Asymptotic solution for linear quadratic optimal control problems with quadratic small parameter

Methaq Hamza Geem; Saud Mohammed Hassan

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 32-39

In this paper we constructed an expansion of an asymptotic solution for singularly perturbed linear-quadratic optimal control with quadratic parameter problem. This formulation is based on direct substituting a postulated asymptotic expansion of boundary function type for the solution into the problem condition and on defining optimal control problems for finding asymptotic terms. The solutions of which form (ϵ=0) for the asymptotic solution, is proven. In physical mathematic problem we say the singularly perturbed linearly quadratic problems is "fast and slow " velocity , in this work we discussed the concept " The slowest velocity" by taken quadratic small parameter in the singularly perturbed linearly quadratic problems.

Application of Modified Adomian Decomposition Method to (2+1)-dimensional Non-linear Wu-Zhang system

Ahmed F. Qasim; Zead Y. Ali

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 40-53

In this paper, the Domain decomposition method (ADM) with modified polynomials is applied for nonlinear (2+1) – dimensional Wu-Zhang system . we compared the solution of the system with MVIM, HPM and RDTM [ 17,13,15]. The numerical results obtained by this polynomial are very effective, convenient and quite accurate to system of partial differential equations. A comparative between the modifications method and the other methods is present from some examples to show the efficiency of each method.

On Edge Addition Problem with some graphs

Zainab A. H. Al-Hassan; Alaa A. Najim

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 54-59

The two questions that: how many edges at least have to be added to the network to ensure the message d within the effective bounds, and how large message delay will be increased when faults occur, can re-write this problem as: What the minimum diameter of a connected graph obtained from a graph of diameter d after adding t extra edges, this problem called “Edge Addition Problem”. In this paper we find some exact values to above problem by using some special graphs (Line Graph, Bipartite graph, and complete Bipartite graph).

Paper Currency Detection based Image Processing Techniques: A review paper

Shaimaa H. Shaker; Mohammed Gheni Alwan

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 1-8

The currency has a great meaning in everyday life. Thus currency recognition has gained a great interest for many researchers. The researchers have suggested diverse approaches to improve currency recognition. Based on strong literature survey, image processing can be considered as the most widespread and effective technique of currency recognition. This paper introduces some close related works of paper-currency recognition. This paper has explained a variety of different currency recognition systems. The applications have used the power of computing to differentiate between different types of currencies with the appropriate layer. Choosing the proper feature would improve overall system performance. The main goal of this work is to compare previous papers and literatures through reviews these literatures and identify the advantages and disadvantage for each method in these literatures. The results were summarized in a comparison table that presented different ways of reviewing the technology used in image processing to distinguish currency papers.

Comparison Between The Efficient Of Routing Protocol In Flying Ad-Hoc Networks (FANET)

Hadeel M. Taher Alnuami

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 9-15

Flying Ad-Hoc Networks (FANETs) is a crowd of Unmanned Air Vehicles (UAVs). The role of the UAV is very developing speedily. Through the advancement of technologies various interesting tasks are likewise related like growth and maintenance cost and incorporation. This technology area is present, which are used for communication purpose. The main characteristics of FANET are flexible, low-cost besides fast to arrange or organize a network. On the other hand, there are the main problems in this category of networks that is the communication between any Unmanned Air Vehicles besides the random movement of UAV in this network. In this paper focused on the mean of FANET network and the main routing protocols on this modern area, then compare between two routing protocol AODV and DSR. The result led to AODV is better than DSR routing in three parameters: PDR, E2E delay and throughput. In addition AODV more appropriate for FANET environment than DSR with different number of nodes in the FANET network.

Video Frames Edge Detection of Red Blood Cells: A Performance Evaluation

Karrar Neamah Hussein

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 16-27

The boundary structure (shape and size) and numbers of Red Blood Cells (RBCs) play a significant role in controlling human physiology. Several blood related diseases including sickle hemoglobin, polycythemia, thalassemia, anemia, and leukemia that occur due to the alteration of RBCs structures need precise detection, analysis, and subsequent inhibition. Diverse boundary analyses that have already been developed to detect the frames edge of blood samples remained ineffective. Thus, an automated system needs to be designed for exact detection of the RBCs edges. The edges being the main features of image often provide vital information to separate regions within an object or to detect changes in illumination. Accordingly, edge detection is regarded as an important step in the analysis of images and extraction of valuable information. In this paper, we evaluated the performance of video frames edge detectors and compared it with different gradient based techniques including Robert, Sobel, Prewitt and Canny, Zero-crossing (Laplacian, Gaussian and fuzzy logic) by applying them on video of RBCs. Two criteria such as mean square error (MSE) and peak signal to noise ratio (PSNR)were exploited to achieve good quality of video frames edge detectors for RBCs. Canny edge and fuzzy logic based techniques revealed the optimum performance towards the detection of video frames edge of RBCs.

Technology of the Coordinator's Construction for Distributed Transactions in the Web Service Conditions

Ali Mohammed Saleh Ahmed; Firas Mohammed Aswad

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 28-34

The article is devoted to the transactions management in the heterogeneous distributed information environments is considered and the construction tool of the transaction coordinator on the basis of the scripting LUA language in the conditions of Web service is offered.
The LUA scripting language, in context of creation of LTM transaction coordinator using the modified query language LQL, has sufficient tools available in modern scenarios programming languages, When determining the library of LTM transaction coordinator built in conditions of LUA machine, using modernized scripting LQL.

3D anaglyph image watermarking approach

Alaa Abdulhussein Daleh Al.magsoosi; Hala A. Naman Al-taee; Bahaa Kareem Mohammed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 35-41

In this paper, a binary watermark is embedded and extracted using principal component analysis along with non-subsampled contourlet transform. Before the use of aforementioned techniques, the binary watermark is scrambled, for which we have used Arnold transform. This will by default add a level of security measures without a password. The approach as presented in the following paper is very efficient, novel, robust and blind. We have also considered the possibility of image processing attacks, hence we have employed non subsampled contourlet transform for the same. The scheme is tested on various images and we have come to a conclusion that this scheme is very performance oriented when compared to the existing watermarking techniques using 3D anaglyphic images.

An Efficient Classification Algorithms for Image Retrieval Based Color and Texture Features

Iman Abduljabbar Saad

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 42-53

Content-Based Image Retrieval CBIR system commonly extracts retrieval results respecting to the similarities of the extracted feature of the given image and the candidate images. The proposed system presented a comparative analysis of five types of classifiers which used in CBIR. These classifiers are Multilayer Perceptron (MP), Sequential Minimal Optimization (SMO), Random Forest (RF), Bayes Network (BN) and Iterative Classifier Optimizer (ICO). It has been investigated to find out the best classifier in term of performance and computation to be the suitable for image retrieval. The low level image features which include texture and color are used in the proposed system. The color features involve color-histogram, color-moments and color-autocorrelogram while texture features involve wavelet transform and log Gabor filter. Also the system will include hybrid of texture and color features to get efficient image retrieval. The system was tested using WANG database, and the best average precision achieved was (85.08%) when combining texture and color features and using the (RF) classifier.

Image Encryption Using Columnar Transportation Technique and Bits Reversing

Mohammed Hasan Abdulameer

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 54-62

Security has become very important aspect during data transmission and storage. Cryptography is used to maintain security. Columnar Transportation Technique is one of the most common methods that used in image encryption. In this paper, we proposed an encryption technique based on columnar Transportation and bits reversing, and named the method (CTR). Different colored images are used in the experiments. Experimental results showed that the proposed method is a secure and effective as a color image encryption method.

2D to 3D conversion using a pair of images “KLT algorithm as a case of development and study”

Sarmad Nihad Mohammed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 63-79

Abstract., This paper investigate how motion between two images is affecting the reconstruction process of the KLT algorithm which we used to convert 2D images to 3D model. The reconstruction process is carried out using a single calibrated camera and an algorithm based on only two views of a scene, the SFM technique based on detecting the correspondence points between the two images, and the Epipolar inliers. Using the KLT algorithm with structure from motion method shows the incompatibility of it with the widely-spaced images. Also, the ability of reducing the rate of reprojection error by removing the images that have the biggest rate of error. The experimental results are consisting from three stages. The first stage is done by using a scene with soft surfaces, the performance of the algorithm shows some deficiencies with the soft surfaces which are have few details. The second stage is done by using different scene with objects which have more details and rough surfaces, the algorithm results become more accurate than the first scene. The third stage is done by using the first scene of the first stage but after adding more details for surface of the ball to motivate the algorithm to detect more points, the results become more accurate than the results of the first stage. The experiments are showing the performance of the algorithm with different scenes and demonstrate the way of improving the algorithm where it found more points from images, so it builds more accurate 3D model.

Design and Implementation of Smart Dust Sensing System for Baghdad City

Hussien A. Mohammed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 80-87

The atmosphere in the world and especially in Iraq is yearly exposed to many dust storms that cause dust floated, which negatively affects the health of people, animals and agriculture. In this research, a system is proposed that used sensor to continuously measure the level of dust in the air of Baghdad city 24 hours /7 days a week. Then analyzing these measurements to determine the level of risk impact on people health especially people with respiratory diseases. The proposed system has the ability of sending warning text message expressing the level of potential threat to the people.
In order to accelerate the rapid processing, an accurate Arduino Uno microcontroller was used to measure the density of the dust and make the required processing. In addition to, using the Global System for Mobile Communications (GSM) type SIMS900 as SMS sender.
The advantages of this system is represented by its ability to alert the people about air pollution in real time, ease of use (where mobile devices are available to most people in Baghdad) and the low cost of sending a message.

Design and Implementation of Efficient and High-Speed Multiplication Circuits Based on Vedic Algorithms

Muthana Yaseen Nawaf Isawi

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 88-99

The increasing speed of computer processors with each passing day has required the design of arithmetic circuits to be verified as high performance. For this reason; by being observed the computer arithmetic, it enabled faster algorithms to come out and verifications of hardware in terms of the facilities that technology provides. The main aim of the computer arithmetic is the design of the circuits and algorithms that will increase the speed of the numerical process. To this end, the design of arithmetic multiplication circuits with a faster and higher bit length is presented through the efficient bit reduction method in this paper. The developed fast and efficient algorithms for arithmetic multiplication process by using the efficient bit reduction method have been observed in this work. By making changes in some multiplication methods that are based on Vedic math’s, the higher bit length circuits of multiplication circuits in the literature which are 4 bits have been developed by using some basic properties of multiplication like decomposition and bit shifting. Analysis of arithmetic circuits is implemented by verifying functionally with VHDL simulations, getting output signal waveform and measurements of delay time. All the circuits of hardware that are observed have been described via VHDL and the performances of multiplication circuits that are synthesized have been presented via FPGA

Proposed method for Analyze the QR code and Detection of Vulnerabilities

Sarah Saadoon Jasim

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 100-109

A 2D matrix that is designed via keeping two points under consideration is QR code, in other words, it stores a large amount of data as compared to 1D barcodes. A Denso-Wave Corporation in Japan has been developed the QR code; the various marker of QR codes over traditional barcodes owns a large storage capacity, read faster, 360-degree reading, printing of small size, correction of error, and supports more languages. The use of QR codes has been expanding over the world because of these benefits. This paper tries to highlight the characteristics, working, significance, and vulnerabilities of the QR codes. After applying the proposed method, the irrelevant positions were detected, then it was removed without any effect on the QR code reading, and these positions are used to hide text or image; indicating that the proposed new method has shown some important characteristics which will affect the security and confidentiality of the QR-code.

Modification of two Parameters Rayleigh into three Parameters one Through Exponentiated

Waleed meaya rodeen

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 1-5

The continuous probability Rayleigh distribution is one of the important Is an important distribution that can be used To analyze signal data and statistical error data as well as time to failure, so we work on modifying two parameters Rayleigh (α,θ) into three parameters one’s (α,θ,λ) through exponentiated, the new p.d.f obtained, also the formula for rth moments about origin is derived, to be used in estimating of parameters and also of reliability function. All derivation required were explained and the estimators by maximum likelihood and moments were obtained using different sets of initial values and the replicate of each experiment is (R=1000), the results are compared by using mean squared error (MSE).

The superiority of fuzzy exponential faimly distributions in measuring the reliability of the machines

Adnan Shamkhi Jaber; Safa Fahm Talal

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 6-18

The study of the efficiency of the reliability of systems or productive systems in scientific life has a significant and important role in the scientific and technological development of these systems. This study deals with the superiority of mass fuzzy exponential distributions (exponential, wibble, kama, natural logarithmic) in measuring the reliability of the machines of the successive system.
The applied study included data taken from the Diesel Station north of Diwaniyah, which is the time of failure and taken to a single block consisting of five machines operating respectively.
The most important results of the study are that the data follow the distributions of the mass fuzzy exponential and the best distribution is the natural distribution logarithmic as the owner of the highest reliability as it turns out that the machines decreased significantly and largely because of the lack of preventive maintenance of these machines because of lack of equipment backup materials as a result of the austerity policy as well as the poor fuel used in operation.

Simulation Methods of Multivariate Normal Distribution

Fadhil Abdul Abbas Abidy; Ali Hussein Battor; Esraa Abdul Reza Baqir

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 19-27

In this paper, we are studying three simulation methods to generate observation for multivariate normal distribution, and these methods are: Matlab mvnrnd, decomposition and conditional methods, and we put simulation programs for each method by Matlab 2015a software, and comparison between these methods by depend on many criterions as MSE, AIC, skw, kur. As well as the run speed criterion for each method to get the best method