Table of content

Journal of Al-Qadisiyah for Computer Science and Mathematics

مجلة القادسية لعلوم الحاسوب والرياضيات

ISSN: 20740204 / 25213504
Publisher: Al-Qadisiyah University
Faculty: Computer Science and Mathematics
Language: English

This journal is Open Access

About

The journal of Al-Qadisiyah of computer science and mathematics is refereed journal holding ISSN (print)2074 – 0204, ISSN(online)2521-3504 . The journal accept original research papers to the editor , this journal covers subjects that include computer science, mathematics and Statistics & Information , is two issues per year, contributions in English and Arabic languages are accepted for submission provided that they conform to the universally accepted rules of scientific research.

Loading...
Contact info

009647821338166

Journalcm@qu.edu.iq
qhaq2010@gmail.com

Table of content: 2019 volume:11 issue:3

Article
Influence of Varying Temperature and Concentration on MHD Peristaltic Transport for Jeffrey Fluid with Variable Viscosity through Porous Channel

Authors: Dheia G. Salih Al-Khafajy --- Ahmed A .Hussein Al-Aridhee
Pages: Math Page 38-49
Loading...
Loading...
Abstract

The present paper deals with the peristaltic motion of Jeffrey fluid with varying temperature and concentration through a porous medium in a coaxial uniform circular tube. The fluid is assumed to be non-Newtonian, namely Jeffrey fluid. The inner tube is uniform, while the outer flexible tube has a sinusoidal wave traveling down its wall. The analytical formulas of the velocity and temperature have been obtained in terms of the Bessel function of first and second kinds. The numerical formula of the axial velocity, temperature and concentration are obtained as functions of the physical parameters of the problem (Darcy number, magnetic parameter, thermal Grashof number, Reynolds number, Prandtl number, and Schmidt number) with other physical parameters are obtained. The Influence of physical parameters of the problem on this formula are discussed numerically and illustrated graphically through a set of figures.


Article
Comprehensive Expansion in Big Data: Innovation and Technology

Authors: Suhiar Mohammed Zeki Abd Alsammed
Pages: Comp Page 7-20
Loading...
Loading...
Abstract

In recent year, the use of the internet and cloud-based application has increased tremendously. With this lot of internet apps and social network have been developed. This apps and networks are growing very rapidly. Data on this network belongs to different data sizes and structures. This data in simple language is called big data. With the increasing demand for services, all the big data services are now automated, which stores and retrieve consumer's data. This data is in a different structure which makes it difficult to handle. This can include an example of road traffic data, different vehicle or person or location or atmosphere can produce a different set of data. Sometimes this data is structured while some times it may contain repeated, null or noisy data. This data may contain images and videos. The traditional database cannot handle this type of unstructured data. The best to solve this dimensionality problem is by using a dimensionality reduction technique. This paper provides the concept of big data collection, its analysis, storage and handling issues, security challenges, and other data handling technique.


Article
Inverse Triangular and Hyperbolic Acceleration Methods of Second Kind for Improving the Numerical Integration Results

Authors: Ali Hassan Mohammed --- Shatha Hardier Theyab
Pages: Math Page 60-65
Loading...
Loading...
Abstract

The aims of this study are to introduce the acceleration methods which are called inverse triangular acceleration methods and inverse hyperbolic triangular acceleration methods, which we generally call Al-Tememe's acceleration methods of the second kind discovered by (Ali Hassan Mohammed). It is useful to improve the numerical results of continuous integrals in which the error is of the 4th order, and regarding to accuracy, the number of used partial intervals and how fast is to get results especially to accelerate the results that can be got by using Simpson's method. Also, it is possible to utilize it in improving the numerical results of differential equations ,where the main error is of the forth order.


Article
On a Subclass of Meromorphic Univalent Functions Involving Hypergeometric Function

Loading...
Loading...
Abstract

The main object of the present paper is to, introduce the. class of meromorphic univalent functions Involving! hypergeomatrc function .We obtain~ some interesting geometric properties according to coefficient inequality , growth and distortion theorems , radii of starlikeness and convexity for the" functions in our subclass.


Article
On Quadratic Unbiased Estimator for Variance Components of One-Way Repeated Measurements Model

Loading...
Loading...
Abstract

In this paper, we investigate the estimator of variance components of one-way repeated measurements model (RMM) using MINQUE-principle (Rao 1971a and Rao 1971b) and method of MINQUE (1) which using priori values for components of variance.


Article
Some Results on Symmetric Reverse ∗-n-Derivations

Authors: Ruqaya Saadi Hashem --- Anwar Khaleel Faraj
Pages: Math Page 1-11
Loading...
Loading...
Abstract

In this paper, the commuting and centralizing of symmetric reverse ∗-n-derivation on Lie ideal are studied and the commutativity of prime ∗-ring with the concept of symmetric reverse ∗-n-derivations are proved under certain conditions.


Article
Robust logistic regression in the presence of high leverage points

Authors: Mohammed A. Mohammed
Pages: Stat Page 1-11
Loading...
Loading...
Abstract

In this article we conceder the logistic regression model with high leverage points. For the logistic regression model with a binary response, we suggested a new robust approach called robust logistic regression (RLR) based on the robust mahalanobis distance (RMD) which depends on the minimum volume ellipsoid (MVE) estimators. The RMD is computed by using the algorithm of stochastic gradient descent (SGD). In order to assist the new suggested approach we compare it with some existing method such as maximum likelihood estimator and robust M-estimator in logistic regression model. The simulation study points that the RLR has supreme performances throw some measurement comparison.


Article
Strongly b star(Sb*) – cleavability(splitability)

Authors: M. Jallalh --- Ghazeel A
Pages: Math Page 21-25
Loading...
Loading...
Abstract

A. Poongothai, R. Parimelazhagan[5] introduced some new type of seperation axioms and study some of their basic properties. Some implications between T_0, T_1and T_2 axioms are also obtained. In this paper we studied the concept of cleavability over these spaces: ( sb*-T_0, sb*-T_1, sb*-T_(2 ) ) as following: 1- If P is a class of topological spaces with certain properties and if X is cleavable over P then X∈P 2- If P is a class of topological spaces with certain properties and if Y is cleavable over P then Y∈P


Article
Proposed Arabic Information Retrieval System Using Cat Swarm Optimization

Authors: Alia karim Abdul Hassan
Pages: Comp Page 1-6
Loading...
Loading...
Abstract

According to the recently published research, the developed Information Retrieval systems are concerned with English language documents compared to all others in Arabic language. لإthe morphological difficulty of Arabic language increases the concerns for the availability of Arabic test copora. Therefore, This paper presents an Arabic information retrieval system for text documents. The proposed algorithm uses Cat Swarm Optimization to select the most important features with the cosine similarity. In addition, it finds the most relevant document to user query. The simulation results in using the standard NLEL of Arabic dataset corpus. The proposed algorithm for Arabic document retrieval uses swarm optimization with cosine similarity which provides effectively with accuracy 81.4%.


Article
Advantages and Disadvantages of Automatic Speaker Recognition Systems

Authors: Rawia Ab. Mohammed --- Akbas E. Ali --- Nidaa F. Hassan
Pages: Comp Page 21-30
Loading...
Loading...
Abstract

Automatic speaker recognition systems use the machines to recognize an individual via a spoken sentence. Those systems recognize a specific individual or confirm an individual’s claimed identity. The most common type of voice biometrics is the Speaker Recognition. Its task focused on validation of a person’s claimed identity, using features that have been obtained via their voices. Throughout the last decades a wide range of new advances in the speaker recognition area have been accomplished, but there are still many problems that need solving or require enhanced solutions. In this paper, a brief overview of speech processing is given firstly, then some feature extraction and classifier techniques are described, also a comparative and analysis of some previous research are studied in depth, all this work leads to determine the best methods for speaker recognition. Adaptive MFCC and Deep Learning methods are determined to be more efficient and accurate than other methods in speaker recognition, thus these methods are recommend to be more suitable for practical applications.


Article
Strongly (E,F)-convexity with applications to optimization problems

Authors: Ammar A. Enad --- Saba N. Majeedb
Pages: Math Page 66-75
Loading...
Loading...
Abstract

In this paper, a new class of nonconvex sets and functions called strongly (E,F)-convex sets and strongly (E,F)-convex functions are introduced. This class is considered as a natural extension of strongly E-convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly (E,F)-convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly (E,F)-convex.


Article
Influence of Heat Transfer on Magnetohydrodynamics Oscillatory Flow for Carreau-Yasuda Fluid Through a Porous Medium

Authors: Hazim Aneed Migtaa --- Dheia G. Salih Al- Khafajy
Pages: Math Page 76-88
Loading...
Loading...
Abstract

This paper, we have examined the influence of transfer the heat on the magnetohydrodynamics (MHD) oscillatory flow of Carreau-Yasuda fluid through porous medium for two types of geometries "Poiseuille flow and Couette flow". We have solved the problem by using the perturbation technique in terms of the Weissenberg number (We), discussed and analyzed the numerical and arithmetical results of the effect of several parameters, namely The number of Darcy, the number of Reynold, the number of Peclet, the parameter of magnetic, the number of Grashof, the number of Weissenberg, frequency of the oscillation and radiation parameter for the velocity and temperature that are effective on the fluid movement by using MATHEMATICA program using illustrations.


Article
Weakly Secondary Submodules

Authors: Ghaleb Ahmed --- Zainab Saadi
Pages: Math Page 50-59
Loading...
Loading...
Abstract

Let M be a non-zero right module over a ring R with an identity. The weakly secondary submodule is introduced in this paper. A non-zero submodule N of M is weakly secondary submodule when Nab⊆K, where a, b∈R and K is a submodule of M implies either Na⊆K or Nb^t⊆ K for some positive integer t. Some relationships between this class of modules and other related modules are discussed and number of conclusions and characterizations are obtained.


Article
Convolution Neural Network with Dual Tree Complex Wavelet Transform Preprocessor for Universal Image Steganalysis

Authors: Halah Hasan Mahmoud --- Hanaa Mohsin Ahmed
Pages: Comp 43-58
Loading...
Loading...
Abstract

Recently, deep learning models based on convolutional neural networks (CNN) have been used in image steganalysis problems. In this paper, we present different architecture of CNN with dual tree complex wavelet transform for preprocessing before input images put into system. The main task of this transform is for exploiting the difference between cover and stego images through shift variance property. The net consists of five successive convolutions layers. Each one following by normalization and pooling layers ends with fully connected layer. The performance of system is evaluated through accuracy, precision, recall and f-score measures. The results show effectiveness of it with more than 0.9 precision values. HUGO, WOW and UNIWARD algorithms selected for implementation.


Article
Studying The Effect of Sampling Time and Network Load on Wireless Networked Control Systems

Authors: Russul N. Abdul-Hussain --- Osama A. Awad
Pages: Comp Page 31-42
Loading...
Loading...
Abstract

Wireless networked control systems (WNCS) are considered one of the main attracting topics in the control, communication and computing domains. One of the main problems that face these systems is the various time delays which occur in the measurements. The control design process would be complicated if there is a time delay in the feedback loop. Moreover, this delay affects the system performance in terms of instability. The literature of WNCS shows that the available controllers can deal with a limited number of nodes. Beyond this limit, the system becomes unstable. In this paper, an optimized Particle Swarm Optimization (PSO)-based PID and FOPID controllers are proposed for WNCS to control the plant wirelessly. The proposed controllers aim at minimizing the time delays and can make the system remains stable when the network tackles a large number of nodes with variable length packet sizes. The performances of the proposed optimized controllers are compared to show which one of them can be more robust against the challenges of WNCS, namely varying time-delays, to handle a greater number of nodes. The results show that the FOPID is more powerful than the PID controller.

Keywords

WNCS --- PID --- FOPID --- PSO --- Time delay --- Number of nodes


Article
Index seek technique for Querying Encrypted Databases

Authors: Sahab Dheyaa Mohammed --- Abdul Monem S. Rahma
Pages: Comp Page 59-68
Loading...
Loading...
Abstract

Encryption is necessary to maintain data confidentiality and protect against outside attackers and internal administrators in the remote database (DB). However, the use of encryption makes it difficult to retrieve data from the remote database .where in traditional methods, is retrieved all data from the DB then, data are decrypted to obtain the specific data requested by the user. However, this process is time-consuming and does not maintain enough data security. In this paper, a technique was proposed to solve traditional method defects in encrypted DB systems. The proposed technique builds queries within the proxy server and retrieves only specified encrypted data from the remote DB without the requirement of retrieved all encryption data, then decrypted at the proxy site. Results showed that the proposed method took less time than conventional methods while maintaining data confidentiality.


Article
Multikey Image Encryption Algorithm Based on a High-Complexity Hyperchaotic System

Authors: Ahmed Sh. Ahmed --- Hussein A. Salah --- Jalal Q.Jameel
Pages: Comp Page 69-85
Loading...
Loading...
Abstract

In life, a chaotic system has many applications in different fields, including physics, biology, communication, and cryptography. In this study, a new hyperchaotic system is introduced. This hyperchaotic system is a two-dimensional system that is based on three maps-namely, logistic, iterative chaotic, and Henon maps. The dynamics of this system are investigated using maximal Lyapunov exponents, bifurcation diagrams, phase portraits, basin of attraction, and complexity via entropy. This system shows highly complicated dynamics. On the basis of the proposed system, a new algorithm for image encryption is also introduced. Confusion and diffusion can be achieved with this algorithm, which are fundamental demands. The stochastic behavior of this system is used to reinforce the security of the encrypted image. The image is divided into four parts, each of which uses a different random key established by the proposed chaotic system. The security of this cryptosystem is validated on the basis of key security parameters and common attacks.


Article
A Comparative Between Corner-Detectors ( Harris, Shi-Tomasi & FAST ) in Images Noisy Using Non-Local Means Filter

Authors: Haydar A.Kadhima --- Waleed A.Araheemah
Pages: Comp Page 86-93
Loading...
Loading...
Abstract

A comparative study was conducted in this paper , between three algorithms which (Harris , Shi-Tomasi , FAST ) interested-points detection to identified the features that required to match , recognize and track objects in images noisy . Detect the interested-points in image noisy one of the most challenges in field of image processing . The noise consider the main cause for damage the natural images during the acquisition and transition , and detect the interested-points of these images doesn’t give the desired results , so eliminating noise from this images is very important , Non-local means approach is applied for solve this problem .


Article
Separation Theorems For Fuzzy Soft normed space

Authors: Noori F. Al-Mayahia --- Donia Sh. Farhood
Pages: Math Page 89-98
Loading...
Loading...
Abstract

In this paper we discussed some theorems in fuzzy soft normed space , and we have some new results on separation theorems.


Article
Using space-filling curves to improve the quad tree for spatial indexing

Authors: Rehab Flaih Hassan --- Ali Abid Hussan Azeez
Pages: Comp Page 94-104
Loading...
Loading...
Abstract

Spatial indexes, like the ones that are based on Quad Tree, are important in spatial data-bases for the effective implementation of queries with spatial constraints, particularly in the case where queries include spatial links. The quad trees are a very interesting subject, given the fact that they give the ability to solve problems in a way that focuses only on the important areas with the highest density of information. But it is not without the disadvantages because the search process in the quartile suffers from the problem of repetition when reaching the terminal node and return to the behaviour of another way in the search and lead to the absorption of large amounts of time and storage. A database management system can handle data very easily if the object is one-dimension (sequential). In this paper, improve the quad tree by combining one of the space filling curve types, including the Hilbert curve and the Z-ordering curve with a quad tree. It will convert from two-dimensional to one-dimensional and sequentially search and end the problem of repetition whenever it reaches a terminal node Ordinary quad tree. Resulting in reduced storage space requirements and improved implementation time.


Article
Using inverse triangular and hyperbolic functions of Al-Tememe acceleration methods of first kind for improving the numerical integration results

Authors: Ali Hassan Mohammed --- Asmahan Abed Yasir
Pages: Math Page 26-37
Loading...
Loading...
Abstract

The main aim of this work is to introduce the acceleration methods which are called the inverse triangular acceleration methods and inverse hyperbolic acceleration methods, which are considered a series of numerated methods. In general, these methods are named as AL-Tememe’s acceleration methods of first kind discovered by (Ali Hassan Mohammed). They are very beneficial to acceleration the numerical results for definite integrations with continuous integrands which are of 2nd order main error, with respect to the accuracy and the number of the used subintervals and the speed of obtaining results. Especially, for accelerating the results which are obviously obtained by trapezoidal and midpoint methods. Moreover, these methods could be enhancing the results of numerical of the ordinary differential equations, where the main errors are of 2nd order.

Table of content: volume:11 issue:3