Table of content

Journal of Al-Qadisiyah for Computer Science and Mathematics

مجلة القادسية لعلوم الحاسوب والرياضيات

ISSN: 20740204 / 25213504
Publisher: Al-Qadisiyah University
Faculty: Computer Science and Mathematics
Language: English

This journal is Open Access

About

The journal of Al-Qadisiyah of computer science and mathematics is refereed journal holding ISSN (print)2074 – 0204, ISSN(online)2521-3504 . The journal accept original research papers to the editor , this journal covers subjects that include computer science, mathematics and Statistics & Information , is two issues per year, contributions in English and Arabic languages are accepted for submission provided that they conform to the universally accepted rules of scientific research.

Loading...
Contact info

009647821338166

Journalcm@qu.edu.iq
qhaq2010@gmail.com

Table of content: 2019 volume:11 issue:1

Article
T-essentially Quasi-Dedekind modules

Loading...
Loading...
Abstract

In this paper, we introduce and study type of modules namely (t-essentially quasi-Dedekind modules) which is generalization of quasi-Dedekind modules and essentially quasi-Dedekind module. Also, we introduce the class of t-essentially prime modules which contains the class of t-essentially quasiDedekind modules.


Article
Cuneiform symbols recognition by support vector machine (SVM)

Loading...
Loading...
Abstract

Cuneiform character recognition represents a complex problem in pattern recognition as result of problems that related to style of this type of writing and the diversity of its features according to distortion and shadows problems. This research proves that polygon approximation method is an optimal feature extra action method , which has been adopted for recognition task compeer with elliptic Fourier descriptor, according to the achieved high accuracy recognition results after applying multiple classes of support vector machine classifier along with depending on its discriminate functions .This work is applied by using two Data set , the first one contains 320 images of cuneiform symbols patterns for evaluate the optimal feature extraction method.The second contains 240 images of cuneiform characters to evaluate the recognition system, agents training dataset consists of 2D four triangular patterns.

Keywords


Article
Segmentation Of Tumor Brain Based On The Colour

Authors: Awfa Hasan Dakheel
Pages: Comp Page 12-17
Loading...
Loading...
Abstract

The objective of this study is to present a method that aids in the diagnosis of diseases in brain due to tumors from MRI brain image whereby segmenting the brain tumor is done by using a novel algorithm that depends on the colour of the 2D image. Therefore, this work consists of three main stages, the first one is loading image into memory, and then the segmentation algorithm is applied. Finally, in order to obliterate the noise object, the 2D median algorithm is conducted. After applying the method the results which are obtained show better output to determine the tumor, simultaneously the diameter of the tumor can be calculated.


Article
Monitoring software risks based on integrated AHP-ANN method

Authors: Jaber Ibrahim Naser --- Hussein Ali Ghadhban Alsalman
Pages: Comp Page 18-26
Loading...
Loading...
Abstract

Software risk management refers to systematic process for analyzing and identifying the project risks. The present paper provides a hybrid method for IT software risks identification. Software projects possess different features which increase the project failure possibilities. Therefore, the present work integrate the Artificial Neural network with the Analytic Hierarchy Process (AHP-ANN) in order to solve the problem of software project estimation in early stage. The questionnaire developed to find out the risk functional model and provide the proposed method with proper data. The results observe a major common risk in software projects is the insufficient knowledge based on different software project life cycle stages. Also, there are some other important factors in software projects such as lack of good estimation in project scheduling, poor definition of project requirements which cause human errors.

Keywords

ANN --- AHP --- risk identification .


Article
Lightweight RC4 Algorithm

Authors: Mustafa M. Abd Zaid --- Soukaena Hassan
Pages: Comp Page 27-32
Loading...
Loading...
Abstract

As a significant number of applications in mobile transactions and wireless sensor networks are characterized by short duration sessions, security issues turn into a focal concern. RC4 algorithm is a standout amongst the most broadly utilized stream ciphers which locates its application in numerous security conventions, for example, Wired Equivalence Privacy (WEP) and Wi-Fi Protocol Access (WPA). In this paper, we suggest a lightweight variation of the well-known RC4 algorithm that is exceptionally appropriate for resources of computational compelled gadgets and energy in remote systems, when contrasted with RC4 and its variations like, HC128, Grain-128, and so on.,. We propose new PRGA which is replaced the PRGA keystream generation algorithm of RC4. The proposed LRC4 execution is surveyed in terms of randomness test and time under an arrangement of analyses. The trial comes about demonstrate that the resulting stream are random, and the suggested algorithm quicker compared to standard RC4, the results indicate the average of speed improvement is about 54% in both encryption/decryption sides.


Article
Images Analysis by Using Fuzzy Clustering

Authors: Shahla Hazim Ahmed Kharofa
Pages: Comp Page 33-40
Loading...
Loading...
Abstract

The Fuzzy C-Mean algorithm is one of the most famous fuzzy clustering techniques. The process of fuzzy clustering is a useful method in analyzing many patterns and images. The Fuzzy C-Mean algorithm is widely used and based on the objective function reduction through adding membership values and the fuzzy coefficient. The Mean Absolute Error (MAE) was also measured in this research for each execution. The research found that when the number of clusters increases, the mean absolute error value is reduced. When the number of clusters increased. The more details in the resulting image were not present in the original image. This helps in the analysis of the images. In this research, medical images were treated and analyzed. The analysis helps physicians explain the patient's health status and also according to suggested algorithm helps them to diagnose the possibility of a particular disease or tumor. A Matlab program was created to perform the analysis.


Article
Predicate the Ability of Extracorporeal Shock Wave Lithotripsy (ESWL) to treat the Kidney Stones by used Combined Classifier

Authors: Samera Shams Hussein --- Lubab Ahmed Tawfeeq --- Sukaina Sh Altyar
Pages: Comp Page 41-52
Loading...
Loading...
Abstract

Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or to using another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classifier (NCC). The samples had been taken from 2850 actual sufferers cases that had been treated at Urology and Nephrology center of Iraq. The results from three cases have been compared to actual treatment results of (ESWL) for trained and nontrained cases and compared the results of three models. The results show that (NCC) approach is the most accurate method in prediction the efficient of uses (ESWL) remedy in treatment the kidney stone.


Article
A Comparative Study of KMCG Segmentation Based on YCbCr, RGB, and HSV Color Spaces

Authors: Fatin Sadiq Alkinani --- Abdul Monem Salih Rahma
Pages: Comp Page 53-59
Loading...
Loading...
Abstract

Kekre Median Codebook Generation (KMCG) is a vector quantization algorithm. It is used for several purposes like image compression and segmentation. It has been applied by several application and shows its efficiency. This paper presents a comparison study of applying KMCG with three color models: RGB, YCbCr, and HSV for image segmentation. The experiments applied on five images, three of them are benchmarks. Two numerical metrics are utilized: E measure and Peak Signal to Noise Ratio (PSNR), in addition to the visual results. The final results show that KMCG conducts better segments when it is applied with the RGB color model. It returns more homogenies segments than using KMCG with YCbCr or HSV.

Keywords


Article
PCA Classification of vibration signals in WSN based oil pipeline monitoring system

Authors: Waleed F. Shareef --- Nasheed F. Mossa
Pages: Comp Page 60-71
Loading...
Loading...
Abstract

Using wireless sensor network technology in structure health monitoring applications results in generating large amount of data. To sift through this data and extract useful information an extensive data analysis should be applied. In this paper, a Wireless Sensor Network (WSNs) is proposed for the oil pipeline monitoring system with proposed method for event detection and classification. The method depends on the Principal Component Analysis (PCA). It applied to features extracted from vibration signals of the monitored pipeline. These vibration signals are collected while applying damage events (knocking and drilling) to the oil pipeline. PCA is applied to features extracted from both time domain and frequency domain. The results manifest that this method is able to detect the existence of damage and also to distinguish between the different levels of harmful events applied to the pipeline.


Article
Development cryptography protocol based on Magic Square and Linear Algebra System

Authors: Abdul Monem S. Rahma --- Doaa Ayad Jabbar
Pages: Comp Page 72-75
Loading...
Loading...
Abstract

Information security cryptographic protocols are very important in the modern era due to the development and advanced technology in internet applications and networks communications. In this paper, we proposed a protocol to save information from passive attacks when sending between two nodes over an insecure channel. This proposed protocol relies on magic square of size 3*3, linear equation system and finite field.


Article
The study of new iterations procedure for expansion mappings

Authors: Zena Hussein Maibed --- Reyadh.D.Ali
Pages: Math Page 11-18
Loading...
Loading...
Abstract

In this research, we introduce new iteration process for different types of mappings and introduce a concept of expansion mapping, it is independent of non-expansive mapping Also, we study the convergences for these iterations to common fixed point in real Hilbert spaces.


Article
Connectedness in ̌Cech Fuzzy Soft Closure Spaces

Authors: Lina H. Maibed --- Rasha N. Majeed
Pages: Math Page 19-26
Loading...
Loading...
Abstract

The notion of ̌cech fuzzy soft closure spaces was defined and its basic properties are introduced very newly by Majeed [1]. In the present paper, we define the notion of fuzzy soft separated sets in ̌cech fuzzy soft closure spaces and prove some properties concerning to this notion. By using the notion of fuzzy soft separated sets we introduce and study the concept of connected in both ̌cech fuzzy soft closure spaces and their associative fuzzy soft topological spaces. Then we introduce the concept of feebly connected, and discuss the relationship between the concepts of connected and feebly connected. Finally, we introduce several examples to clarify our results.


Article
On Β*c– open set and its properties

Loading...
Loading...
Abstract

In this paper we introduced a new set is said Β*c– open set where we studied and identified its properties and find the relation with other sets and our concluded a new class of the function called Β*c– cont. function, Β*c– open function, Β*c– closed function.


Article
Modification Of High Performance Training Algorithms for Solve Singularly Perturbed Volterra integro-differential and integral equation

Authors: Khalid. Mindeel. M. Al-Abrahemee
Pages: Math Page 36-44
Loading...
Loading...
Abstract

In this paper, we apply neural network for solve singularly perturbed Volterra integrodifferential equations (SPVIDE) and singularly perturbed Volterra integral equations (SPVIE). Using Modification Of High Performance Training Algorithms such as quase-Newton, Levenberge-Marqaurdt, and Baysian Regulation. The proposed method was compared with the standard training algorithms and analytical methods. We found that the proposed method is characterized by high accuracy in the results, a lower error rate and a speed that is much convergent to standard methods.


Article
Property of oscillation of first order impulsive neutral differential equations with positive and negative coefficients

Authors: Hussain Ali Mohamad --- Aqeel Falih Jaddoa
Pages: Math Page 45-51
Loading...
Loading...
Abstract

In this paper, necessary and sufficient conditions for oscillation are obtained, so that every solution of the linear impulsive neutral differential equation with variable delays and variable coefficients oscillates. Most of authors who study the oscillatory criteria of impulsive neutral differential equations, investigate the case of constant delays and variable coefficients. However the points of impulsive in this paper are more general. An illustrate example is given to demonstrate our claim and explain the results.


Article
On strongly E-convex sets and strongly E-convex cone sets

Authors: Saba Naser Majeed
Pages: Math Page 52-59
Loading...
Loading...
Abstract

-convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties. Some examples to illustrate the aforementioned concepts and to clarify the relationships between them are established.


Article
A new subclasses of meromorphic univalent functions associated with a differential operator

Authors: Hazha Zirar Hussain
Pages: Math Page 60-69
Loading...
Loading...
Abstract

In this paper we have introduced and studied some new subclasses of meromorphic univalent functions which are defined by means of a differential operator. We have obtained numerous sharp results including coefficient conditions, extreme points, distortion bounds and convex combinations for the above classes of meromorphic univalent functions.


Article
Haar Wavelet Technique for Solving Fractional Differential Equations with An Application

Authors: Mohammed S. Mechee --- Oday I. Al-Shaher --- Ghassan A. Al-Juaifri
Pages: Math Page 70-79
Loading...
Loading...
Abstract

In this article, the approxmated solutions of ordinary differential equations of fractional order using Haar wavelet and B-spline bases are introduced. The algorithm of collection method is updated using two basis. Several initial value problems has been solved to show the applicability and efficacy of the Haar wavelet and B-spline basis. An application of Lane-Eman equation has been introduced and studied. The approximated results have clearly shown the advantage and the efficiency of the modified method in terms of accuracy and computational time.


Article
Some Properties of the Prolongation Limit Random Sets in Random Dynamical Systems

Authors: Ihsan Jabbar Kadhim --- Sundus Talib Mohsin
Pages: Math Page 87-95
Loading...
Loading...
Abstract

The aim of this paper is to study the omega limit set with new concepts of the prolongation limit random sets in random dynamical systems, where some properties are proved and introduced such as the relation among the orbit closure, orbit and omega limit random set. Also we prove that the first prolongation of a closed random set containing this set, the first prolongation is closed and invariant. In addition, it is connected whenever it is compact provided that the phase space of the random dynamical systems is locally compact. Then, we study the prolongational limit random set and examined some essential properties of this set. Finally, the relation among the first prolongation, the prolongational limit random set and the positive trajectory of a random set is given and proved.


Article
On the class of multivalent analytic functions defined by differential operator for derivative of first order

Authors: Zainab Odeh A.Mohammed --- Kassim A. Jassim
Pages: Math Page 80-86
Loading...
Loading...
Abstract

In the submitted search ,by making use of Differential operator ,we drive coefficient bounds and some important properties of the subclass Ti(n,p,q,a, A) (P,j E N= {1,2,...}; q,n,E N0=N U {0};0<= a


Article
On Differential Sandwich Results For Analytic Functions

Authors: Waggas Galib Atshan --- Sarah Abd Al-Hmeed Jawad
Pages: Math Page 96-101
Loading...
Loading...
Abstract

In this paper , we obtain some subordination and superordination results involving the integral operator Fc.Also,we get Differential sandwich results for classes of univalent functions in the unit disk.


Article
Properties of The Space GFB(V, U)

Authors: Jehad R. Kider --- Manar N. Gheeab
Pages: Math Page 102-110
Loading...
Loading...
Abstract

Our goal in the present paper is to recall the concept of general fuzzy normed space and its basic properties to define the general fuzzy bounded operator as a background to introduce the notion general fuzzy norm of a general fuzzy bounded linear operator. After that we proved any operator from a general fuzzy normed space into a general complete general fuzzy normed space has an extension. Also we prove that a general fuzzy bounded operator on a general fuzzy normed space is equivalent to a general fuzzy continuous. Finally different types of fuzzy approaches of operators is introduced in order to prove that the general fuzzy normed space GFB(V,U) is general complete when U is general complete.


Article
A Class of Meromorphic p-valent Functions

Authors: Waggas Galib Atshan --- Sarah Abd Al-Hmeed Jawad
Pages: Math Page 111-116
Loading...
Loading...
Abstract

In this paper, we define a class of meromorphic p-valent functions and study some properties as coefficient inequality, closure theorem , growth and distortion bounds , arithmetic mean, radius of convexity, Convex linear combination and partial sums .


Article
On Differential Sandwich Theorems of Multivalent Functions Defined by a Linear operar

Authors: Waggas Galib Atshan --- Salwa Kalf Kazim
Pages: Math Page 117-123
Loading...
Loading...
Abstract

The main object of the present paper is to derive some results for multivalent analytic functions defined by linear operator by using differential subordination and superordination


Article
Bayesian adaptive Lasso Tobit regression

Authors: Haider Kadhim Abbas --- Rahim Jabbar Thaher
Pages: Stat Page 1-10
Loading...
Loading...
Abstract

In this paper, we introduce a new procedure for model selection in Tobit regression, we suggest the Bayesian adaptive Lasso Tobit regression (BALTR) for variable selection (VS) and coefficient estimation. We submitted a Bayesian hierarchical model and Gibbs sampler (GS) for our procedure. Our proposed procedure is clarified by means of simulations and a real data analysis. Results demonstrate our procedure performs well in comparison to further procedures.

Table of content: volume:11 issue:1