ISSN: 20740204 / 25213504
Publisher: Al-Qadisiyah University
Faculty: Computer Science and Mathematics
Language: English
This journal is Open Access
The journal of Al-Qadisiyah of computer science and mathematics is refereed journal holding ISSN (print)2074 – 0204, ISSN(online)2521-3504 . The journal accept original research papers to the editor , this journal covers subjects that include computer science, mathematics and Statistics & Information , is two issues per year, contributions in English and Arabic languages are accepted for submission provided that they conform to the universally accepted rules of scientific research.
009647821338166
Journalcm@qu.edu.iq
qhaq2010@gmail.com
The present paper deals with the peristaltic motion of Jeffrey fluid with varying temperature and concentration through a porous medium in a coaxial uniform circular tube. The fluid is assumed to be non-Newtonian, namely Jeffrey fluid. The inner tube is uniform, while the outer flexible tube has a sinusoidal wave traveling down its wall. The analytical formulas of the velocity and temperature have been obtained in terms of the Bessel function of first and second kinds. The numerical formula of the axial velocity, temperature and concentration are obtained as functions of the physical parameters of the problem (Darcy number, magnetic parameter, thermal Grashof number, Reynolds number, Prandtl number, and Schmidt number) with other physical parameters are obtained. The Influence of physical parameters of the problem on this formula are discussed numerically and illustrated graphically through a set of figures.
Magneto hydrodynamic --- Jeffrey Fluid --- Variable Viscosity --- heat transfer --- Porous Channel.
In recent year, the use of the internet and cloud-based application has increased tremendously. With this lot of internet apps and social network have been developed. This apps and networks are growing very rapidly. Data on this network belongs to different data sizes and structures. This data in simple language is called big data. With the increasing demand for services, all the big data services are now automated, which stores and retrieve consumer's data. This data is in a different structure which makes it difficult to handle. This can include an example of road traffic data, different vehicle or person or location or atmosphere can produce a different set of data. Sometimes this data is structured while some times it may contain repeated, null or noisy data. This data may contain images and videos. The traditional database cannot handle this type of unstructured data. The best to solve this dimensionality problem is by using a dimensionality reduction technique. This paper provides the concept of big data collection, its analysis, storage and handling issues, security challenges, and other data handling technique.
Big data --- IT companies --- Energy Management --- Confusion Matrix.
The aims of this study are to introduce the acceleration methods which are called inverse triangular acceleration methods and inverse hyperbolic triangular acceleration methods, which we generally call Al-Tememe's acceleration methods of the second kind discovered by (Ali Hassan Mohammed). It is useful to improve the numerical results of continuous integrals in which the error is of the 4th order, and regarding to accuracy, the number of used partial intervals and how fast is to get results especially to accelerate the results that can be got by using Simpson's method. Also, it is possible to utilize it in improving the numerical results of differential equations ,where the main error is of the forth order.
The main object of the present paper is to, introduce the. class of meromorphic univalent functions Involving! hypergeomatrc function .We obtain~ some interesting geometric properties according to coefficient inequality , growth and distortion theorems , radii of starlikeness and convexity for the" functions in our subclass.
Hypergeometric function --- meromorphic univalent function --- Hadamard product
In this paper, we investigate the estimator of variance components of one-way repeated measurements model (RMM) using MINQUE-principle (Rao 1971a and Rao 1971b) and method of MINQUE (1) which using priori values for components of variance.
In this paper, the commuting and centralizing of symmetric reverse ∗-n-derivation on Lie ideal are studied and the commutativity of prime ∗-ring with the concept of symmetric reverse ∗-n-derivations are proved under certain conditions.
Prime ring --- ∗-n-derivation --- Reverse ∗-n-derivation --- Commuting mapping --- Centralizing mapping --- Permuting mapping.
In this article we conceder the logistic regression model with high leverage points. For the logistic regression model with a binary response, we suggested a new robust approach called robust logistic regression (RLR) based on the robust mahalanobis distance (RMD) which depends on the minimum volume ellipsoid (MVE) estimators. The RMD is computed by using the algorithm of stochastic gradient descent (SGD). In order to assist the new suggested approach we compare it with some existing method such as maximum likelihood estimator and robust M-estimator in logistic regression model. The simulation study points that the RLR has supreme performances throw some measurement comparison.
Logistic regression model --- MVE --- RMD --- SGD and HLPs
A. Poongothai, R. Parimelazhagan[5] introduced some new type of seperation axioms and study some of their basic properties. Some implications between T_0, T_1and T_2 axioms are also obtained. In this paper we studied the concept of cleavability over these spaces: ( sb*-T_0, sb*-T_1, sb*-T_(2 ) ) as following: 1- If P is a class of topological spaces with certain properties and if X is cleavable over P then X∈P 2- If P is a class of topological spaces with certain properties and if Y is cleavable over P then Y∈P
According to the recently published research, the developed Information Retrieval systems are concerned with English language documents compared to all others in Arabic language. لإthe morphological difficulty of Arabic language increases the concerns for the availability of Arabic test copora. Therefore, This paper presents an Arabic information retrieval system for text documents. The proposed algorithm uses Cat Swarm Optimization to select the most important features with the cosine similarity. In addition, it finds the most relevant document to user query. The simulation results in using the standard NLEL of Arabic dataset corpus. The proposed algorithm for Arabic document retrieval uses swarm optimization with cosine similarity which provides effectively with accuracy 81.4%.
Keywords:Information --- Retrieval --- Arabic --- NLEL --- Cat --- Optimization --- Feature --- Selection.
Automatic speaker recognition systems use the machines to recognize an individual via a spoken sentence. Those systems recognize a specific individual or confirm an individual’s claimed identity. The most common type of voice biometrics is the Speaker Recognition. Its task focused on validation of a person’s claimed identity, using features that have been obtained via their voices. Throughout the last decades a wide range of new advances in the speaker recognition area have been accomplished, but there are still many problems that need solving or require enhanced solutions. In this paper, a brief overview of speech processing is given firstly, then some feature extraction and classifier techniques are described, also a comparative and analysis of some previous research are studied in depth, all this work leads to determine the best methods for speaker recognition. Adaptive MFCC and Deep Learning methods are determined to be more efficient and accurate than other methods in speaker recognition, thus these methods are recommend to be more suitable for practical applications.
Automatic Speaker Recognition --- Voice Biometrics --- Deep Learning --- Adaptive MFCC.
In this paper, a new class of nonconvex sets and functions called strongly (E,F)-convex sets and strongly (E,F)-convex functions are introduced. This class is considered as a natural extension of strongly E-convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly (E,F)-convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly (E,F)-convex.
strongly E-convex sets --- strongly E-convex functions --- strongly (E --- F)-convex sets --- strongly (E --- F)-convex functions
This paper, we have examined the influence of transfer the heat on the magnetohydrodynamics (MHD) oscillatory flow of Carreau-Yasuda fluid through porous medium for two types of geometries "Poiseuille flow and Couette flow". We have solved the problem by using the perturbation technique in terms of the Weissenberg number (We), discussed and analyzed the numerical and arithmetical results of the effect of several parameters, namely The number of Darcy, the number of Reynold, the number of Peclet, the parameter of magnetic, the number of Grashof, the number of Weissenberg, frequency of the oscillation and radiation parameter for the velocity and temperature that are effective on the fluid movement by using MATHEMATICA program using illustrations.
Carreau-Yasuda fluid --- magneto hydrodynamics (MHD) --- oscillatory flow.
Let M be a non-zero right module over a ring R with an identity. The weakly secondary submodule is introduced in this paper. A non-zero submodule N of M is weakly secondary submodule when Nab⊆K, where a, b∈R and K is a submodule of M implies either Na⊆K or Nb^t⊆ K for some positive integer t. Some relationships between this class of modules and other related modules are discussed and number of conclusions and characterizations are obtained.
Recently, deep learning models based on convolutional neural networks (CNN) have been used in image steganalysis problems. In this paper, we present different architecture of CNN with dual tree complex wavelet transform for preprocessing before input images put into system. The main task of this transform is for exploiting the difference between cover and stego images through shift variance property. The net consists of five successive convolutions layers. Each one following by normalization and pooling layers ends with fully connected layer. The performance of system is evaluated through accuracy, precision, recall and f-score measures. The results show effectiveness of it with more than 0.9 precision values. HUGO, WOW and UNIWARD algorithms selected for implementation.
Dual tree complex wavelet transform --- convolution neural network --- Accuracy --- Precision.
Wireless networked control systems (WNCS) are considered one of the main attracting topics in the control, communication and computing domains. One of the main problems that face these systems is the various time delays which occur in the measurements. The control design process would be complicated if there is a time delay in the feedback loop. Moreover, this delay affects the system performance in terms of instability. The literature of WNCS shows that the available controllers can deal with a limited number of nodes. Beyond this limit, the system becomes unstable. In this paper, an optimized Particle Swarm Optimization (PSO)-based PID and FOPID controllers are proposed for WNCS to control the plant wirelessly. The proposed controllers aim at minimizing the time delays and can make the system remains stable when the network tackles a large number of nodes with variable length packet sizes. The performances of the proposed optimized controllers are compared to show which one of them can be more robust against the challenges of WNCS, namely varying time-delays, to handle a greater number of nodes. The results show that the FOPID is more powerful than the PID controller.
WNCS --- PID --- FOPID --- PSO --- Time delay --- Number of nodes
Encryption is necessary to maintain data confidentiality and protect against outside attackers and internal administrators in the remote database (DB). However, the use of encryption makes it difficult to retrieve data from the remote database .where in traditional methods, is retrieved all data from the DB then, data are decrypted to obtain the specific data requested by the user. However, this process is time-consuming and does not maintain enough data security. In this paper, a technique was proposed to solve traditional method defects in encrypted DB systems. The proposed technique builds queries within the proxy server and retrieves only specified encrypted data from the remote DB without the requirement of retrieved all encryption data, then decrypted at the proxy site. Results showed that the proposed method took less time than conventional methods while maintaining data confidentiality.
Encryption database --- Encoding data --- Indexing techniques --- Index field generation --- query processing.
In life, a chaotic system has many applications in different fields, including physics, biology, communication, and cryptography. In this study, a new hyperchaotic system is introduced. This hyperchaotic system is a two-dimensional system that is based on three maps-namely, logistic, iterative chaotic, and Henon maps. The dynamics of this system are investigated using maximal Lyapunov exponents, bifurcation diagrams, phase portraits, basin of attraction, and complexity via entropy. This system shows highly complicated dynamics. On the basis of the proposed system, a new algorithm for image encryption is also introduced. Confusion and diffusion can be achieved with this algorithm, which are fundamental demands. The stochastic behavior of this system is used to reinforce the security of the encrypted image. The image is divided into four parts, each of which uses a different random key established by the proposed chaotic system. The security of this cryptosystem is validated on the basis of key security parameters and common attacks.
A comparative study was conducted in this paper , between three algorithms which (Harris , Shi-Tomasi , FAST ) interested-points detection to identified the features that required to match , recognize and track objects in images noisy . Detect the interested-points in image noisy one of the most challenges in field of image processing . The noise consider the main cause for damage the natural images during the acquisition and transition , and detect the interested-points of these images doesn’t give the desired results , so eliminating noise from this images is very important , Non-local means approach is applied for solve this problem .
Harris Detector --- Shi-Tomasi Detector --- FAST Detector --- Noisy Image --- Non-Local Mean Filter.
In this paper we discussed some theorems in fuzzy soft normed space , and we have some new results on separation theorems.
Fuzzy soft normed space --- fuzzy soft continuity --- fuzzy soft boundedness --- separation theorems.
Spatial indexes, like the ones that are based on Quad Tree, are important in spatial data-bases for the effective implementation of queries with spatial constraints, particularly in the case where queries include spatial links. The quad trees are a very interesting subject, given the fact that they give the ability to solve problems in a way that focuses only on the important areas with the highest density of information. But it is not without the disadvantages because the search process in the quartile suffers from the problem of repetition when reaching the terminal node and return to the behaviour of another way in the search and lead to the absorption of large amounts of time and storage. A database management system can handle data very easily if the object is one-dimension (sequential). In this paper, improve the quad tree by combining one of the space filling curve types, including the Hilbert curve and the Z-ordering curve with a quad tree. It will convert from two-dimensional to one-dimensional and sequentially search and end the problem of repetition whenever it reaches a terminal node Ordinary quad tree. Resulting in reduced storage space requirements and improved implementation time.
Space filling curve --- quad trees --- Z-order curves --- Hilbert curve (H-curve) --- multi-dimensional --- data structure.
The main aim of this work is to introduce the acceleration methods which are called the inverse triangular acceleration methods and inverse hyperbolic acceleration methods, which are considered a series of numerated methods. In general, these methods are named as AL-Tememe’s acceleration methods of first kind discovered by (Ali Hassan Mohammed). They are very beneficial to acceleration the numerical results for definite integrations with continuous integrands which are of 2nd order main error, with respect to the accuracy and the number of the used subintervals and the speed of obtaining results. Especially, for accelerating the results which are obviously obtained by trapezoidal and midpoint methods. Moreover, these methods could be enhancing the results of numerical of the ordinary differential equations, where the main errors are of 2nd order.