Journal of Al-Qadisiyah for Computer Science and MathematicsJournal of Al-Qadisiyah for Computer Science and Mathematics
https://csm.iraqjournals.com/
Tue, 22 Oct 2019 04:12:41 +0100FeedCreatorJournal of Al-Qadisiyah for Computer Science and Mathematics
https://csm.iraqjournals.com/
Feed provided by Journal of Al-Qadisiyah for Computer Science and Mathematics. Click to visit.Influence of Varying Temperature and Concentration on MHD Peristaltic Transport for Jeffrey ...
https://csm.iraqjournals.com/article_162551_12888.html
The present paper deals with the peristaltic motion of Jeffrey fluid with varying temperature and concentration through a porous medium in a coaxial uniform circular tube. The fluid is assumed to be non-Newtonian, namely Jeffrey fluid. The inner tube is uniform, while the outer flexible tube has a sinusoidal wave traveling down its wall. The analytical formulas of the velocity and temperature have been obtained in terms of the Bessel function of first and second kinds. The numerical formula of the axial velocity, temperature and concentration are obtained as functions of the physical parameters of the problem (Darcy number, magnetic parameter, thermal Grashof number, Reynolds number, Prandtl number, and Schmidt number) with other physical parameters are obtained. The Influence of physical parameters of the problem on this formula are discussed numerically and illustrated graphically through a set of figures.Fri, 27 Dec 2019 20:30:00 +0100Comprehensive Expansion in Big Data: Innovation and Technology
https://csm.iraqjournals.com/article_162552_12888.html
In recent year, the use of the internet and cloud-based application has increased tremendously. With this lot of internet apps and social network have been developed. This apps and networks are growing very rapidly. Data on this network belongs to different data sizes and structures. This data in simple language is called big data. With the increasing demand for services, all the big data services are now automated, which stores and retrieve consumer's data. This data is in a different structure which makes it difficult to handle. This can include an example of road traffic data, different vehicle or person or location or atmosphere can produce a different set of data. Sometimes this data is structured while some times it may contain repeated, null or noisy data. This data may contain images and videos. The traditional database cannot handle this type of unstructured data. The best to solve this dimensionality problem is by using a dimensionality reduction technique. This paper provides the concept of big data collection, its analysis, storage and handling issues, security challenges, and other data handling technique.Fri, 27 Dec 2019 20:30:00 +0100Inverse Triangular and Hyperbolic Acceleration Methods of Second Kind for Improving the ...
https://csm.iraqjournals.com/article_162553_12888.html
The aims of this study are to introduce the acceleration methods which are called inverse triangular acceleration methods and inverse hyperbolic triangular acceleration methods, which we generally call Al-Tememe's acceleration methods of the second kind discovered by (Ali Hassan Mohammed). It is useful to improve the numerical results of continuous integrals in which the error is of the 4th order, and regarding to accuracy, the number of used partial intervals and how fast is to get results especially to accelerate the results that can be got by using Simpson's method. Also, it is possible to utilize it in improving the numerical results of differential equations ,where the main error is of the forth order.Fri, 27 Dec 2019 20:30:00 +0100On a Subclass of Meromorphic Univalent Functions Involving Hypergeometric Function
https://csm.iraqjournals.com/article_162554_12888.html
The main object of the present paper is to, introduce the. class of meromorphic univalent functions Involving! hypergeomatrc function .We obtain~ some interesting geometric properties according to coefficient inequality , growth and distortion theorems , radii of starlikeness and convexity for the" functions in our subclass.Fri, 27 Dec 2019 20:30:00 +0100On Quadratic Unbiased Estimator for Variance Components of One-Way Repeated Measurements Model
https://csm.iraqjournals.com/article_162555_12888.html
In this paper, we investigate the estimator of variance components of one-way repeated measurements model (RMM) using MINQUE-principle (Rao 1971a and Rao 1971b) and method of MINQUE (1) which using priori values for components of variance.Fri, 27 Dec 2019 20:30:00 +0100Some Results on Symmetric Reverse ∗-n-Derivations
https://csm.iraqjournals.com/article_162556_12888.html
In this paper, the commuting and centralizing of symmetric reverse ∗-n-derivation on Lie ideal are studied and the commutativity of prime ∗-ring with the concept of symmetric reverse ∗-n-derivations are proved under certain conditions.Fri, 27 Dec 2019 20:30:00 +0100Robust logistic regression in the presence of high leverage points
https://csm.iraqjournals.com/article_162557_12888.html
In this article we conceder the logistic regression model with high leverage points. For the logistic regression model with a binary response, we suggested a new robust approach called robust logistic regression (RLR) based on the robust mahalanobis distance (RMD) which depends on the minimum volume ellipsoid (MVE) estimators. The RMD is computed by using the algorithm of stochastic gradient descent (SGD). In order to assist the new suggested approach we compare it with some existing method such as maximum likelihood estimator and robust M-estimator in logistic regression model. The simulation study points that the RLR has supreme performances throw some measurement comparison.Fri, 27 Dec 2019 20:30:00 +0100Strongly b star(Sb*) – cleavability(splitability)
https://csm.iraqjournals.com/article_162558_12888.html
A. Poongothai, R. Parimelazhagan[5] introduced some new type of seperation axioms and study some of their basic properties. Some implications between T_0, T_1and T_2 axioms are also obtained. In this paper we studied the concept of cleavability over these spaces: ( sb*-T_0, sb*-T_1, sb*-T_(2 ) ) as following:
1- If P is a class of topological spaces with certain properties and if X is cleavable over P then X∈P
2- If P is a class of topological spaces with certain properties and if Y is cleavable over P then Y∈PFri, 27 Dec 2019 20:30:00 +0100Proposed Arabic Information Retrieval System Using Cat Swarm Optimization
https://csm.iraqjournals.com/article_162559_12888.html
According to the recently published research, the developed Information Retrieval systems are concerned with English language documents compared to all others in Arabic language. لإthe morphological difficulty of Arabic language increases the concerns for the availability of Arabic test copora. Therefore, This paper presents an Arabic information retrieval system for text documents. The proposed algorithm uses Cat Swarm Optimization to select the most important features with the cosine similarity. In addition, it finds the most relevant document to user query. The simulation results in using the standard NLEL of Arabic dataset corpus. The proposed algorithm for Arabic document retrieval uses swarm optimization with cosine similarity which provides effectively with accuracy 81.4%.Fri, 27 Dec 2019 20:30:00 +0100Advantages and Disadvantages of Automatic Speaker Recognition Systems
https://csm.iraqjournals.com/article_162560_12888.html
Automatic speaker recognition systems use the machines to recognize an individual via a spoken sentence. Those systems recognize a specific individual or confirm an individual’s claimed identity. The most common type of voice biometrics is the Speaker Recognition. Its task focused on validation of a person’s claimed identity, using features that have been obtained via their voices. Throughout the last decades a wide range of new advances in the speaker recognition area have been accomplished, but there are still many problems that need solving or require enhanced solutions. In this paper, a brief overview of speech processing is given firstly, then some feature extraction and classifier techniques are described, also a comparative and analysis of some previous research are studied in depth, all this work leads to determine the best methods for speaker recognition. Adaptive MFCC and Deep Learning methods are determined to be more efficient and accurate than other methods in speaker recognition, thus these methods are recommend to be more suitable for practical applications.Fri, 27 Dec 2019 20:30:00 +0100Strongly (E,F)-convexity with applications to optimization problems
https://csm.iraqjournals.com/article_162561_12888.html
In this paper, a new class of nonconvex sets and functions called strongly (E,F)-convex sets and strongly (E,F)-convex functions are introduced. This class is considered as a natural extension of strongly E-convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly (E,F)-convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly (E,F)-convex.Fri, 27 Dec 2019 20:30:00 +0100Influence of Heat Transfer on Magnetohydrodynamics Oscillatory Flow for Carreau-Yasuda Fluid ...
https://csm.iraqjournals.com/article_162562_12888.html
This paper, we have examined the influence of transfer the heat on the magnetohydrodynamics (MHD) oscillatory flow of Carreau-Yasuda fluid through porous medium for two types of geometries "Poiseuille flow and Couette flow". We have solved the problem by using the perturbation technique in terms of the Weissenberg number (We), discussed and analyzed the numerical and arithmetical results of the effect of several parameters, namely The number of Darcy, the number of Reynold, the number of Peclet, the parameter of magnetic, the number of Grashof, the number of Weissenberg, frequency of the oscillation and radiation parameter for the velocity and temperature that are effective on the fluid movement by using MATHEMATICA program using illustrations.Fri, 27 Dec 2019 20:30:00 +0100Weakly Secondary Submodules
https://csm.iraqjournals.com/article_162563_12888.html
Let M be a non-zero right module over a ring R with an identity. The weakly secondary submodule is introduced in this paper. A non-zero submodule N of M is weakly secondary submodule when Nab⊆K, where a, b∈R and K is a submodule of M implies either Na⊆K or Nb^t⊆ K for some positive integer t. Some relationships between this class of modules and other related modules are discussed and number of conclusions and characterizations are obtained.Fri, 27 Dec 2019 20:30:00 +0100