Volume 10, Issue 2, Summer 2018, Page 1-117


Geometric Properties for a family of p-valent Holomorphic Functions with Negative Coefficients for Operator on Hilbert Space

Abbas Kareem Wanas; Sema Kadhim Jebur

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 1-5

The purpose of the present investigation is to introduce and study a certain subclass 〖Ak〗_p (α,β,δ,T) of p-valent holomorphic functions with negative coefficients of the operators on Hilbert space in U. Moreover, we get a number of geometric properties.

A New Electronic Voting Protocol Using Secret Sharing Based on Set of Path Domination

Samaa F. Ibraheem

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 6-14

For secret electronic voting protocol we always need a secure system. Secret sharing scheme are proved to be safe guarding through distributing the input key to number of participants then reconstructing the shares through a secure process. In this paper, the set of dominating paths in special graph is used to share the votes among a set of candidates, such that, each candidate represents an edge in the graph. Based on this new technique, we have shown that it is secure and confidential. The efficiency of the new protocol is demonstrated in terms of time and cost.

On the(G.n)_ Tupled fixed point theorems in fuzzy metric spacea

Zena Hussein Maibed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 15-25

The porpose of this paper is to introduce a new concepts of (G.n)- tupled fixed point and (G.n)- tupled coincidence point. And, to study the existence of tupled fixed (coincidence) point for any type of mappings. We will also establish some convergence theorems to a unique (G.n) – tupled fixed (coincidence ) point in the complete fuzzy metric spaces.

Analysis of Heat Transfer on Peristaltic Transport of Powell- Eyring Fluid in an Inclined Tapered Symmetric Channel with Hall and Ohm's Heating Influences

Hayat A. Ali; Ahmed M. Abdulhadi

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 26-41

In this paper, we present an analysis of heat transfer on peristaltic flow for Powell- Eyring fluid in an inclined symmetric tapered channel is discussed. Hall effect, velocity, thermal slip conditions, and Ohm's heating are taken into consideration. The governing equations for the balance of mass, momentum and energy are modeled, and then simplified by holding the consideration of long wavelength and low Renolds number approximation. Graphical results are given to analyze the behavior of the parameters emerging in the problem. Effect of Hall parameter and Hartman number on velocity axial have opposite characteristics.

Fixed Point Principles in General b-Metric Spaces and b-Menger Probabilistic spaces

Salwa Salman Abed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 42-53

In this work, three general principles for existence a fixed point and a common fixed point are proved in types of general metric spaces, which conclude the existence a fixed point of set-valued mapping in a general b-metric space , the existence of common fixed point of three commuting orbitally continuous χ- condensing mappings and a result of fixed point for set-valued condensing mapping defined on probabilistic bounded subset of b- Menger probabilistic metric space.

Fabrication of Substitution-Box Initiated Implementing Invertible Mapping and Improving its Competency of Confusion by Compliment’s Mechanism

Muhammad Sarfraz; Yongjin Li; Fateh Ali; Zain-Ul-Abideen Haroon; Akhter Rasheed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 54-63

In this research article, an innovative strategy is exploited to design a nonlinear component Substitution Box (S-box). To achieve an objective, initially we pick out a one specific sort of primitive irreducible polynomial of degree 8 to generate elements of Galois field GF(2^8). Furthermore, we established a precise category of invertible mapping through an employment of left action of invertible matrix having order of 2×2 on GF(2^8) to generate elements of S-box. Moreover, to improve the confusion aptitude of erected S-box we exerted 1’s and 2’s compliment’s technique for shuffling of an elements of S-box. Eventually, to inspect the capacity of designed S-box we bring into effective action of different procedures from literature such as strict avalanche criterion, nonlinearity, linear approximation probability, bit independence criterion and differential approximation probability.

Intertwining approximation in space ,

Nada Zuhair Abd AL-Sada

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 64-69

In this paper, we find the degree of best approximation between a pair of a nearly intertwining polynomials, and a pair of a nearly intertwining splines to a non-negative function f∈L_(ψ,p) (I)∩∆^0 (j_s ) , in , , we find the order of best a nearly intertwining approximation in the above terms.

On P- Hausdorff Topological Random Systems

Sema Kadhim Jebur

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 70-78

We are taking aview of topologicall random systems which is introduce considered as a mixing between two fundamental branches of mathematics "topology" and "probability Theory". The concept of P- Hausdorff topological random system is studied and some properties of such system are given and proved.

Non-polynomial spline finite difference method for solving second order boundary value problem

Bushra A. Taha; Abdulhassan J. Kadhim

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 92-101

Second -order two-point boundary value problems (BVPs) were solved based on a of non-polynomial spline general functions with finite difference method.In this paper we discusses a method depended on using special finite-difference approximations for derivatives and formatting a formula that can be deal with endpoints that exceed the usual finite-difference formula for derivatives. Convergence analysis of the method is discussed. The numerical description of the method is shown by four examples. So the results obtained by our method are very encouraging over other existing methods.

Complaint Monitoring System Using Android in Iraq

Raghad Baker Sadiq Majeed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 1-9

Despite the widespread use of smartphones in Iraq and the possession of a vast number of people, the Iraqi environment is still lacking efficient applications that provide a real collaboration between the citizens and government through advanced diverse services. These applications will increase the transparency through monitoring the performance of the government institutions by citizens. Moreover, citizens can enforce the government employees to finish their works efficiently on time. Mayoralty of Baghdad is one of these institutions that contains many municipalities which are responsible for maintaining and running the city. Complaint Monitoring System (M-complaint) is created to help citizens to submit their complaints with photos of problem’s locations and track their locations using Global Positioning System (GPS) accurately. Citizens can track their complaints and reply the amount of satisfaction to the solutions which provided by municipalities. In addition, daily, the system will automatically filter the unsolved claims within seven days and submit a notification to the higher authority to find the suitable solutions. The aim of creating this application is to simplify the process of registering a complaint to the municipal and monitor the status of it (solved/not solved) in a quicker and cheaper way. Also, it measures the amount of citizens 'satisfaction depending on the provided solutions. If the problem were not be resolved within seven days, the system would automatically send a notification to the higher authority to follow up neglected complaints and take necessary actions. This system supports transparency and integrity and enables both citizens and officials to follow up on the performance of their employees. It considers as a part of Mobile government (M-government).

Condor Cloud New Solutions

Ali Hameed Yassir; Ali Fattah Dakhil; Wafaa Mohammed Ali

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 10-16

In this article author proposes a new solution in the field of distributed computing needs, humans’ requirements of new ways for developing technologies that increase information systems distribution horizontally and decrease the power consumption and delay time vertically. The author presents in detail the distributed computing concepts, types and some examples like Condor system of distribution and the proposal for developing.

Influence Factors of Adoption E-commerce in Iraqi SMEs

Ahmed Luay Ahmed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 17-26

Today the most significant technologies that change the business environment is the Internet that has a great effect on the future of electronic commerce (e-commerce). Currently e-commerce plays a vital role in the development of small and medium enterprises (SME). Therefore, Iraq must involve its SME in this field in order to no longer be separated from the business world and the new economy. The objective of this paper is to identify the factors that prevent the adoption e-commerce by SME. The researcher prefers to use qualitative and quantitative approach due to identify these factors. The results showed the most important factors that affect directly and must be considered in order to adoption of e-commerce in SME. Adoption these factors will help Iraqi SME’s to gain long term success in the global market.

R-tree for spatial data structure

Hassnen Hazem Azez

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 27-35

Spatial database usually consult with the gathering of records which have a spatial coordinates and are described inside a space.
On the way to support spatial items in a database gadget several issues need to be taken into consideration inclusive of spatial records models, indexing mechanisms, efficient query processing, and value models.
A commonplace real global usage for an R-tree data shape might be to save spatial item, after which discover answer quick to queries. This means that its miles and green and essential index creation for plenty multidimensional statistics base software because each construction time and performance profits in question processing are vital. The proposed work is a simple implementation of spatial data structure that supports the manipulation, storage, and analysis and display data in visual form.

Hybrid techniques to improve face recognition based on features extraction methods and Haar discrete wavelet transformation

Israa AbdulAmeer AbdulJabbar; Zainab Ali Yakoob

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 36-46

This paper uses hybrid techniques to improve the rate of recognition for a face from identified data set of faces. These techniques are summarized by applying firstly the Haar discrete wavelet transformation method in order to enhance and compress the images of the data set and store the results for each process in a separate data set. Secondly, applying a hybrid method from two popular face recognition methods called Principal Component Analysis and Singular Value Decomposition for extracting feature from the images. This work applied by using a dataset contains 400 images for 40 different persons called Olivetti Research Laboratory (ORL). In calculating the distances between image vectors, Manhattan measurement is used and its show a very good results in recognition rate. From this work, it can be concluded that recognition rate increments with the decrementing in the number of dataset images and increasing the threshold value. The expended time in execution decreases in a very obvious way when using the compressed dataset rather than the enhanced dataset which its images has four times the size of the images in the compressed dataset.

Simulation of autonomous mobile robot using fuzzy logic

Nada Badr Jarah

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 47-58

Abstract. One of the most important issues in the world of robot is the development of a smart system to improve the movement of autonomous mobile robots and non-collision within the place in which it moves, which requires machine learning and development of operational capabilities in the ability to visualize, data processing and decision-making.
The aim of this research is to simulate using the fuzzy logic in the matlab program of the robot movement to avoid the obstacle and reach the required place Beside the wall. Real world is strongly characterized by uncertainty. Fuzzy logic has proven to be a conventional tool for handling such uncertainties.

Solving Traveling Salesman Problem Using Cuckoo Search and Ant Colony Algorithms

Luma Salal Hasan

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 59-64

Optimization is a method that is used from economic to design. The best tools available are very important to be utilities .when there is some randomize nature value that's depend in the algorithm is called stochastic. Algorithm with stochastic partitions are often named heuristic or meta heuristic recently.
Traveling salesman problem (TSP)is hard a combinatorial optimization problem that leads to find the best tour for the person . this problem can be applicator in many different area such as DNA fragments, planning and logistics. There are many algorithm that is used to solve this problem.
In this paper, Ant colony optimization (ACO) is the first algorithm that is applied which depending on the ant colonies law for finding the best tour of TSP .
The other algorithm that is performed, is cuckoo search (CS) that satisfy the law of brood parasitism of some cuckoo specie to find the best tour of the same problem.
Compare between two algorithms of meta heuristic for six cities with different parameter's value to evaluate the result . conclude that the CS performance is better than ACO with speed convergence.

Cloud Storage: Cloud Computing and Social Media to utilizing Selective Dissemination of Information Service

Othman Atta Ismail

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 65-78

This paper touched upon cloud computing, their technologies and social media to provide selective dissemination of information service for the research community and the beneficiaries. It identifies the concept of cloud computing and its advantages and services offered in the field of libraries and information. It also identifies the concept of social media. The paper Builds a digital warehouse and makes digital book link available on social media to serve researchers and beneficiaries and to meet their demands and needs.

Adaptive feed control of operating tool in Robot machine

Haider A. Abbas Mohammed; Aqeel thamer jawad; Samah Jalil Saba Khmas

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 79-87

Adaptive ornate milling technology involves variation of milling operational parameters (particularly, cutter feed speed) based on wood surface texture at the processing spot. It is appropriate to use wood fiber orientation optical recognition method for adaptive ornate milling.
Adaptive milling method is very efficient for ornate milling, when cutter moves along a complex trajectory in space, and feed direction and fibers alignment substantially alters along the trajectory. Moreover, at sharp trajectory sections, adaptive choice of operational parameters permits to materially reduce the chance of wood damaging. Adaptive milling method is most effective for poor value wood that has low stress-strain properties and complex surface structure, so is very prone to damage.
System for programmed PID controller adjustment involves computer with software for certain operating system, input/output hardware and connector cables. Communication with facilities is typically performed by use of ОРС server. While adjusting, an object is included in the control loop. The system adjusts and PID controller is registering obtained parameters. Obtained in such way controller parameters will be near optimal due to intuitive user interface, high computer capability and limitless system identification algorithms.
The format in the search shows schematic structure of automated control system of tool feed in adaptive milling, which uses CNC-controlled 3D vertical milling machine, control computer and camera for wood fiber orientation optical recognition, its signal being transferred to milling parameters optimization application.
It should be noted that at such milling with control of supply rate along the complex trajectory of supply of the milling tool, it would be possible to significantly reduce the percentage of shatters. This would allow to significantly reduce economic expenditures for additional operations concerning the surface recovery.

An Adaptive Intrusion Detection System by using Decision Tree

Osamah Adil Raheem; Esraa Saleh Alomari

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 88-96

In recent decades, data security has turned into a new vision in data innovation as the quantity of PC protection breaks are presented to an explosion in the number of security incidents. An assortment of Sequence Discovery System have been utilized for shielding PCs and systems from pernicious system based or have based assaults by utilizing conventional measurable strategies to new information mining approaches in a years ago. In any case, the present monetarily accessible interruption identification frameworks are mark based that are not equipped for identifying obscure assaults. In this paper, we introduce another learning calculation for abnormality based system interruption identification framework utilizing choice tree calculation that recognizes assaults from ordinary practices and distinguishes diverse kinds of interruptions. Test comes about on the KDD-99 bench-mark organize interruption discovery data-set exhibit that the suggested algorithm resulted 98.5% Discovery rate in comparing with other executing techniques.

A model for human activities recognition using partially occluded images

Fadheela Sabri Abu-Almash

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 97-107

The demand for Human Activities Recognition (HAR) from still images and corresponding features categorization using appropriate classifier is never ending. HAR of partially occluded object using still image is highly challenging than extracting information from video due to the absence of any prior knowledge resembling frames stream .This new research domain dealing with the computer identification and subsequent classification of specific activities to develop understanding of human behaviors has diversified applied interests in surveillance cameras, security systems and automotive industry. We propose a new model for HAR with occluded missing part of human body in still image.(A template is built to complete the full appearance predictable by the system and their subsequent features classification is made.)The problems of HAR in still images are addressed using nonlinear Support Vector Machine classifier. The process of de-noising and chamfer matching are performed. This model is simulated with1200 still images of (64 x 128) pixels based on existing datasets such (INRIA and KTH). Using this model ,a recognition rate 86% is achieved for seven activities such as running, walking, jumping, clapping, jogging, boxing and waving .The excellent features of the results suggest that our method may constitute a basis for HAR with occlusion human body parts in still images promising for accurate features classification.

A Surveyof human face detection methods

Farah Qais Abdulalla; Asmaa Sadiq abduljabar; Shaimaa Hameed Shaker

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 108-117

The aim of this research is to produce a critical survey on detecting and extracting human face with the features over the past 10-15 years. Face Detection is one of the most common techniques in various future visual applications, such as teleconferencing, facial recognition systems, biometrics and human computer interface , not only because of the difficult nature of the face as an object, but also because of the myriad applications that require face detection application as a first step .
Finally, we offer a facial detection technology based on skin color segmentation as well as the facial features inside it. The determination of the human face as elliptical area was achieved. Meanwhile, several techniques were used such as enhancement, thresholding, edge detections and binarization techniques to achieve the aim of the suggested method. The facial features are detected and extracted inside the elliptical area; these features can be categorized in three parts: Nose, Mouth and lips localization. The features are detected and extracted in the human face based on image processing techniques.

Use of logistic regression to study the most important factors affecting the incidence of tuberculosis

Hayder Raaid Talib; Ahmed Razzaq Abd; Ali Hamdullah Ahmed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 1-9

What distinguishes this research Is to focus on the concept of logistic the regression and its characteristics and how to build the model analytical descriptive approach was used to describe the logistic regression How to estimate Its Features And its use as an important tool in studying the influencing factors in the injury of tuberculosis the sample included 299 patients.

Evaluating the Quality of Health services provided to the population of The Arab Republic of Egypt

Mona Saeed Mohamed

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 1-21

Egypt is the most populous country in the Middle East and it was ranked 111 among the ranks of 188 countries in the human world report of 2016 so it was necessary to adopt effective programs for human development especially that direct to health, because health has become a standard of well-being in developed countries. Among the population targets in Egypt is raising the health properties of citizens and provide a good health program able to protect them from the risk of diseases. One of these efforts is the establishment of the general
Authority for social health insurance as a health experiments. Its health services cover more than 59% of the total population in 2017 which means that it included more than half of the population. It becomes the most important health establishment in the country which protects people from the risk of diseases. One of the advantages of this experiments, it’s not completely free and it’s not completely high cost.

Comparison of four non-Bayesian methods to estimate the scale parameter for Modified Weibull distribution by using the Simulation

Iden Hassan Hussein; Hazim Ghdhaib Kalt

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 22-27

In this paper, four methods were obtained to estimate the scale parameter of Modified Weibull distribution using complete data, which are the Modified Moments Estimator (MME), the Maximum Likelihood Estimator (MLE), White Estimator (WE) and Least Squares Estimator (LSE), Monte Carlo simulation is used to compare these four estimators with respect to the Mean Square Error criteria (MSE), and the results on simulated samples of the comparison showed that for all the varying sample size in this study, and in all cases for the four methods The MLE method is best followed by the OLSE method then the WE method and the MME method .

Linear programming measures for solving the problem of a linear division of convex multiplayers.

Sarmad H. Ali; Osamah A. Ali; Samir C. Ajmi

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 79-91

In this research, we are trying to solve Simplex methods which are used for successively improving solution and finding the optimal solution, by using different types of methods Linear, the concept of linear separation is widely used in the study of machine learning, through this study we will find the optimal method to solve by comparing the time consumed by both Quadric and Fisher methods.