About Journal

The Al-Rafidain Journal of Computer Sciences and Mathematics (CSMJ) is an international one which publishes written researches articles in English language in the areas of both computer sciences and mathematics. Contribution is open for researchers of all nationalities. One volume is published each year, and each volume consists of two issues ( June and December).
Read More ...

Honey Encryption Security Techniques: A Review Paper

Ammar Abdul Majed Gharbi; Ahmed Sami Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 1-14
DOI: 10.33899/csmj.2022.174390

From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this paper, we offer a review of the honey encryption planner. Honey Encryption is the encryption system that ensures flexibility versus the brute-force attack through the provision of plain reasonable text, but false for each key is invalid utilized by a trespasser to decrypt a message, two key areas are open it is difficult to create a compelling message trap that's perfect enough to deceive the striker even when he believes that he has the message in its original form.
 The next problem, the typo issue, where a valid phony plain text seem to a lawful user when he accidentally enters the wrong key. Our goal is to have more satisfaction disguised tricks that are perfect enough to prevent a trespasser from getting the original message, We also need new security methods because the attackers are looking for new ways to attack the systems, so we proposed a new way to protect messages and passwords well and difficult to break and take all the possibilities of attack, including the brute-force, and then the data is hidden in an image with a public secret key.

Quality of Service and Load Balancing in Cloud Computing: A Review

Muna M.T. Jawhar; Hanaa Mohammed Osman

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 15-22
DOI: 10.33899/csmj.2022.174391

Cloud computing provides facilities. These facilities increased demand for its using as institutions and individuals moved to the cloud service. Therefore, cloud service providers must provide services to users based on the expected quality. One of the main challenges presented by the cloud computing is the Quality of Service management. QoS management is defined as allocating resources to applications to ensure service based on reliability, performance and availability. It is necessary to allocate resources based on load balancing that allows avoiding overloading or low loading in virtual machines, and this is a challenge for researchers in the field of cloud computing. This research highlights the importance of cloud computing, its types and importance, It also reviews some researches in the field of quality assurance of service in computing.

EMV Electronic Payment System and its Attacks: A Review

Ahmed ِAlqassab; Yassin Hikmat Ismael

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 23-29
DOI: 10.33899/csmj.2022.174392

 Recently,The Automated Teller Machines (ATM) and Point of Sale (POS) are based on the Europay, MasterCard and VisaCard (EMV) protocol. The goal of the EMV protocol is to enhance and improve the level of transaction security at both ATMs and Points of Sale. Despite the high performance of electronic payment systems, they suffer from attacks that can lead to unauthorized disclosure of cardholder data. This paper describes the EMV protocol and its features, and common attacks that threaten EMV card users in transactions at both ATMs and Points of Sale. The study will document the vulnerabilities that threaten EMV card holders and provide countermeasures against various potential attacks. It also describes the proposed methods that have been introduced in recent years to overcome these attacks and enhance the security level of the EMV protocol. The results of the comparison showed that biometrics has the highest performance in card security based on the EMV protocol with additional improvements in the encryption phase against all types of attacks.

An overview of Cuckoo Optimization Algorithm based Image Processing

Baydaa sulaiman

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 31-36
DOI: 10.33899/csmj.2022.174393

The Cuckoo Search (CS) algorithm is an effective swarm intelligence optimization algorithm whose important developments were presented by Yang and Deb in 2009. The CS algorithm has been used in many applications to solve optimization problems. This paper describes an overview of the applications of CS in the scope of image processing to solve optimization problems for the image during the years 2015-2021. The main categories reviewed that used CS in the field of image processing are: image segmentation, image optimization, image noise removal, image classification, feature extraction in images, image clustering and edge detection. The aim of this paper is to provide an overview and summarize the literature review of applying CS algorithm in these categories in order to extract which categories that applied this algorithm more than others. From this review we conclude that CS was mostly applied in the image segmentation category to optimize the threshold search.

On Positive Solution of a New Class of Nonlocal Fractional Equation with Integral Boundary Conditions

Noora L. Housain

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 37-40
DOI: 10.33899/csmj.2022.174394

We prove that a positiveasolution to a given boundaryaproblem exists and is unique. This new boundaryacondition  relates theanon-local unknown value of unknownafunction at λ with its influenceadue to aasup-strip (µ,1), 0<λ<µ<1 .Our resultsaare aobtainted by using " Banach andaKrasnoselskii’satheorems"a linked to anywhere. Some classicalatheorems of fixedapoints assistance to achieve the greatestaresults.

Design and Implement an Application to Measure the Readiness of Teachers to Adopt E-learning in Mosul Schools After Pandemic COVID-19

Dena Rafaa Ahmed; Maisirreem Adhed Kamal; Rashad Alsaigh

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 41-50
DOI: 10.33899/csmj.2022.174398

Nowadays, due to the rapid increment of the pandemic COVID-19 which affects the teaching environment, a need appeared to use a new alternative education style, which helps to decrement the injuries and the continuation of the education. This study designs an application to measure the teachers’ readiness to use e-learning. A questionnaire was designed to collect as much information as possible to measure the teachers' readiness to adopt e-learning in Iraqi schools after pandemic COVID-19 by analyzing the factors that affect the education process. The questionnaire consists of thirty-three questions in the Arabic language and includes three sections (background information, attitude toward e-learning, and computer skills). The collected responses are taken from Mosul’s primary and secondary schools’ teachers and the sample size is (261). A test of reliability was carried out on the study instrument, and the value of Cronbach’s alpha was 0.913. The MATLAB R2014a was used to build an application in order to do the analyzing process and determine the readiness of e-learning.

Diagnosis Retinal Disease by using Deep Learning Models

attallh salih; Manar Y. Kashmoola

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 51-58
DOI: 10.33899/csmj.2022.174403

Deep learning approaches have shown to be useful in assisting physicians in making decisions about cancer, heart disease, degenerative brain disorders, and eye disease. In this work, a deep learning model was proposed for the diagnosis of retinal diseases utilizing optical coherence tomography X-ray pictures (OCT) to identify four states of retina disease. The proposed model consists of three different convolutional neural network (CNN) models to be used in this approach and compare the results of each one with others. The models were named respectively as 1FE1C, 2FE2C, and 3FE3C according to the design complexity. The concept uses deep CNN to learn a feature hierarchy from pixels to layers of classification retinal diseases. On the test set, the classifier accuracy is 65.60 % for a (1FE1C) Model, 86.81% for (2FE2C) Model, 96.00% for (3FE3C) Model, and 88.62% for (VGG16) Pre-Train Model. The third model (3FE3C) achieves the best accuracy, although the VGG16 model comes close. Also, this model improves the results of previous works and paves the way for the use of state-of-the-art technology of neural network in retinal disease diagnoses. The suggested strategy may have a bearing on the development of a tool for automatically identifying retinal disease.

Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement

Mohammad Khalil Ismail; Zohair Al-Ameen

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 59-69
DOI: 10.33899/csmj.2022.174407

 Images captured at night with low-light conditions frequently have a loss of visible details, inadequate contrast, low brightness, and noise. Therefore, it is difficult to perceive, extract, and analyze important visual information from these images, unless they were properly processed. Different algorithms exist to process nighttime images, yet most of these algorithms are highly complex, generate processing artifacts, over-smooth the images, or do not improve the illumination adequately. Thus, the single scale retinex (SSR) algorithm is adopted in this study to provide better processing for nighttime images. The proposed algorithm starts by converting the color image from the RGB model to the HSV model and enhancing the V channel only while preserving the H and S channels. Then, it determined the image’s illuminated version somewhat like the SSR, computes the logarithms of the illuminated and original images, then subtracts these two images by utilizing an altered procedure. Next, a modified gamma-adjusted Rayleigh distribution function is applied, and its outcome is processed once more by an automatic linear contrast stretching approach to produce the processed V channel that will be utilized with the preserved H and S channels to generate the output RGB image. The developed algorithm is assessed using a real dataset of nighttime images, evaluated using three dedicated image evaluation methods, and compared to ten dissimilar contemporary algorithms. The obtained results demonstrated that the proposed algorithm can significantly improve the perceptual quality of nighttime images and suppress artifact generation rapidly and efficiently, in addition to showing the ability to surpass the performance of different existing algorithms subjectively and objectively.

Non-Complex Statistics-Driven Algorithm for Enhancement of Grayscale and Color Images

Ahmed Waad Mohammed; Zohair Al-Ameen

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 71-80
DOI: 10.33899/csmj.2022.174410

 Low-contrast images are viewed with obscured details and are unfavorable to the observer. Hence, it is a necessity to process such an effect efficiently to get images with lucid details as the need for clear images become a global demand. Therefore, a statistics-based algorithm of simple complexity is introduced in this research to process color and grayscale images with low contrast. The proposed algorithm consists of five stages, where the first and second stages include the use of two different statistical s-curve transformations, the third stage combines the outputs of the aforesaid stage, the fourth stage improves the brightness, and the fifth stage reallocates the pixels to the natural interval. The proposed algorithm is compared with six modern algorithms, and the outputs are evaluated using two no-reference methods. The obtained results show that the proposed algorithm performed the best, providing the highest image evaluation readings and it was the fastest among the comparison methods.

Using Socket.io Approach for Many-to-Many Bi-Directional Video Conferencing

Sameer Jasim Karam; Bikhtiyar Friyad Abdulrahman

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 81-86
DOI: 10.33899/csmj.2022.174411

Video conferencing has become a critical need in today’s world due to its importance in education and business to mention a few; also, recent years have witnessed a great revolution in communication technologies. However, there still exist limitations in these technologies in terms of the quality of communication established between two peers. Therefore, many solutions have been suggested for a variety of video conferencing applications. One of these technologies is Web Real-Time Communication technology (WebRTC). WebRTC provides the ability to efficiently perform peer-to-peer communication, which improves the quality of the communication. This work tries to propose a WebRTC bi-directional video conferencing for many-to-many (mesh topology) peers. In this work, signaling was obtained using Socket.io Library. The performance evaluation of the proposed approach was performed in terms of CPU performance, and Quality of Experience (QoE). Moreover, to validate the simulations results, a real implementation was achieved based on the following scenarios a) involving several peers, b) at the same time, opening several video rooms, c) a session will still be active even when the room initiator leaves, and d) new users can be shared with currently involved participants.

Multilevel Database Security for Android Using Fast Encryption Methods

Najla Badie AI Dabagh; Mahmood S. Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 87-96
DOI: 10.33899/csmj.2022.174412

Multilevel Security (MLS) is one of the ways that protects the stored information in the computer and mobile devices. It classifies users and information into levels of security; thus, the user can access information within its level or less.
A smartphone is used in managing some of businesses, controlling the home and car devices within the smart city environment by using a set of data stored in the database. The database is used by more than one authorized user some of this data is confidential and important that requires protection from un authorized users.
In this research a proposed system to implement the MLS principle within three levels of security is presented. The first level gives the user its own security level. The second level transfers users through the system parts according to their security level (system administrator or regular user). The third level allows users to manipulate the stored encrypted data in SQLite database by using a simple and quick cryptographic algorithm.
The proposed system is implemented in the smart mobile devices which are supported by the Android operating system. The experimental result showed that the proposed system has the ability to protect the data in the database and prevents users to view the data at upper levels. Also, the inability of users to change the security level of data that prevents the leak of data from the upper security levels to the lower level. Moreover, the proposed system works quickly and needs a little storage space.

Generalized h-Closed Sets in Topological Space

Beyda S. Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 97-102
DOI: 10.33899/csmj.2022.174413

This study introduce a new type of closed sets in topology called Generalized h-closed sets (briefly, gh-closed) define as follow: ⊆ χ  be gh-closed set if CLh (E)⊆ U  whenever EU and U is open set in (χ,τ). The relation between gh-closed set and other classes of closed sets ( h-closed, g-closed, g -closed, g-closed and αg-closed) are studied. Also, the notion of gh-continuous mapping on topological space is introduce and some properties are proved. Finally, the separation axioms have been studied.

Performance Evaluation of Vehicle Ad hoc Networks Under Wi-Fi-6 Technology

Ahmed Salih Hasan; Basim Mohammed Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 103-109
DOI: 10.33899/csmj.2022.174414

Vehicle ad hoc networks are considered mobile networks where the nodes are mobile objects and can change their positions within an environment over time. These objects can be connected at any time according to a predefined strategy. Simulating this kind of network needs high attention to many details. Moreover, the literature lacks works that describe the requirements of simulating such networks. Therefore, this work tries to describe the requirements of simulating vehicle networks (VANETs). Moreover, the goal is to determine what is needed to simulate vehicle networks in terms of the distribution of vehicles, the movement patterns, and the routing protocols used. The simulation results show interesting facts about the VANET networks and the best strategies to minimize the consumption of network resources. Finally, this work considers two communication technologies among network nodes; Wi-Fi 5 and Wi-Fi 6.

Disease Diagnosis Systems Using Machine Learning and Deep learning Techniques Based on TensorFlow Toolkit: A review

Firdews A.Alsalman; Shler Farhad Khorshid; Amira Bibo Sallow

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 111-120
DOI: 10.33899/csmj.2022.174415

Machine learning and deep learning algorithms have become increasingly important in the medical field, especially for diagnosing disease using medical databases. Techniques developed within these two fields are now used to classify different diseases. Although the number of Machine Learning algorithms is vast and increasing, the number of frameworks and libraries that implement them is also vast and growing.  TensorFlow is a well-known machine learning library that has been used by several researchers in the field of disease classification. With the help of TensorFlow (Google's framework), a complex calculation can be addressed effectively by modeling it as a graph and properly mapping the graph segments to the machine in the form of a cluster. In this review paper, the role of the TensorFlow-Python framework- for disease classification is discussed.

Using The Hybrid GA-Ant Algorithm To Find The Optimal Path In Computer Networks

Ibtisam Kareem Turki

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 121-129
DOI: 10.33899/csmj.2022.174416

Cost management is one of the performance standards in computer networks and routing strategies through which we can get effective paths in the computer network, reach the target and perform highly in the network by improving the routing table (jumps). This paper is an attempt to propose a new H design mixed algorithm (ACO-GA) that includes the best features of both ACO and GA with a new application that combines both previous algorithms called( H- Hybrid (ACO-GA) hybrid algorithm technology, which differs in its parameters. In order to research and find the optimal path, the improved ant algorithm was used to explore the network, using smart beams, getting the paths generated by ants and then using them as inputs into the genetic algorithm in the form of arranged pairs of chromosomes.
Experimental results through extensive simulations showed that H (ACO-GA) improves the routing schedule, represented by the pheromone values that ants leave when following their path in the network. The values given in the table( 3.2) vary according to the quality of the pheromone concentration. In this case, it is possible to give the greatest opportunity to choose the best quality according to the concentration of the pheromone. For this purpose, a network consisting of four nodes (1), (2), (3), (4) was used starting with node (1) which is the source node and the destination node (2), by calling the selection technique to update the pheromone table by choosing the path to node (1 ). For this case and for selecting the destination node (2), the pheromone table for the nodes visited by the ant is updated. We calculated the final destination )2) by dividing the ratio. Thus, we get to reduce the search area, speed up search time, and improve the quality of the solution by obtaining the optimum set of paths.

Use Various Mathematical Methods to Solve Three Dimensional Conduction Heat Equation in Cylindrical Coordinate

AHMED SALAR; Ahmed Jassim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 131-135
DOI: 10.33899/csmj.2022.174417

In this paper we use the separation of variables method and L24c transform method to solve three-dimensional conduction heat equation in cylindrical coordinate and results plotted by using Matlab. It was concluded that L24c transform method is better than the method of separating the variables because it is a method that reaches the solution with fewer steps

Construction of a complete (Ƙ,b)-span in PG(3,13)

Hamid Mohamed khalaf; Nada Yassen Kasm Yahya

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 137-147
DOI: 10.33899/csmj.2022.174418

The main goal of this work is to find a spread of PG(3,13). By construct a complete span which represents applications of algebraic geometry in 3-dimensional projective space PG(3,q). We prove that the maximum (Ƙ,b)-span in PG(3,13) is (170,b)-sp -span, which is a spread.

 
                                                      

Managing Bank Loans By Using Neural Networks

ramadan al-Brahimi; Nima Abdullah AL-Fakhry AL-Fakhry

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 149-155
DOI: 10.33899/csmj.2022.174419

This study aims at recognizing the role of neural networks in deciding administrative decisions in banks. To achieve the aims, the study developed a suggested model that depends on artificial neural networks as a stabilization tool to support loans management decisions. The Descent Conjugate Gradient algorithm is adopted to build the suggested model through checking loan demands according to the various banking instructions. The results showed that using such techniques in administrative business was a success through evaluating loan demands and deciding the most appropriate ones, with the possibility of refusing or accepting the agent’s demand, and also the possibility of deciding the loans which were demanded more than the other types.

Medical Image Classification Using Different Machine Learning Algorithms

Sami H. Ismael; Shahab W. Kareem; Firas H. Almukhtar

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 135-147
DOI: 10.33899/csmj.2020.164682

The different types of white blood cells equips us an important data for diagnosing and identifying of many diseases. The automation of this task can save time and avoid errors in the identification process. In this paper, we explore whether using shape features of nucleus is sufficient to classify white blood cells or not. According to this, an automatic system is implemented that is able to identify and analyze White Blood Cells (WBCs) into five categories (Basophil, Eosinophil, Lymphocyte, Monocyte, and Neutrophil). Four steps are required for such a system; the first step represents the segmentation of the cell images and the second step involves the scanning of each segmented image to prepare its dataset. Extracting the shapes and textures from scanned image are performed in the third step. Finally, different machine learning algorithms such as (K* classifier, Additive Regression, Bagging, Input Mapped Classifier, or Decision Table) is separately applied to the extracted (shapes and textures) to obtain the results. Each algorithm results are compared to select the best one according to different criteria’s.
 

Data Modeling and Design Implementation for CouchDB Database

Shaymaa Ahmed Razoqi

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 39-55
DOI: 10.33899/csmj.2021.168252

In the modern database environment, new non-traditional database types appear that are Not SQL database (NoSQL). This NoSQL database does not rely on the principles of the relational database. Couchdb is one of the NoSQL Document-Oriented databases, in Couchdb the basic element was a document. All types of databases have the same conceptual data model and it was deferent in the logical and physical model, this mean UML class diagram can be used in the  NoSQL design at a conceptual level, that is, it can be used to design a Couchdb database. In this research, we suggest a method to model and implement the conceptual level of the Couchdb database from the UML class diagram in using simple way depending on the association types. Depending on the types of relationships between classes, we can have more than one database model to choose from and find the most suitable for the system to be designed. A medical clinic database was proposed to implement the transfer steps according to the proposed method. Three database models were designed and implemented to study the suitability of the proposed transfer method.

Survey on Human Activity Recognition using Smartphone

Adeeba KH; Laheeb M. Ibrahim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 55-67
DOI: 10.33899/csmj.2021.168253

The field of Human Activity Recognition (HAR) is an active research field in which methods are being developed to understand human behavior by interpreting features obtained from various sources, these activities can be recognized using interactive sensors that are affected by human movement. Sensor can embed elements within Smartphones or Personal Digital Assistants (PDAs). The great increase in smart phone users and the increase in the sensor ability of these smart phones, and users usually carry their smartphones with them. This fact makes HAR more important and accepted.
In this survey, A number of previous studies were studied and analyzed, where we prepared a comparison of the research works conducted over the period 2010-2020 in human activity recognition using Smartphone sensors. Comparison charts highlight their most important aspects such as a type of sensor used, activities, sensor placement, HAR- system type (offline, online), computing device, classifier (type of algorithms) and system accuracy levels.
 

Waves and Ripples in Liquid Films

Joseph G. Abdulahad; Abdulrahman M. Morshed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2004, Volume 1, Issue 2, Pages 187-198
DOI: 10.33899/csmj.2004.8153

In this paper we present a mathematical model for two- dimensional incompressible flow in a symmetric thin liquid films with the viscosity forces, which can be very small, compared with surface tension and inertia forces. We obtain the governing differential equation for such flow, we also determine the solution of equations and also we consider an inviscid waves in thin films.

A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code

Nada Kasm Yahya; Zyiad Adrees Hamad Youines

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 13-25
DOI: 10.33899/csmj.2020.163511

In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1).

Studying the Bessell Equation of Complex Order

Thair Y. Thanoon; Omar Thaher shalal

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 13-27
DOI: 10.33899/csmj.2020.163517

In this paper we derive Bessel equation of complex order (n + i), after that generalized recurrence relations from Bessel equation of order (n) to Bessel equation of complex order (n + i) and will satisfy that. We given illustrates example of different cases .
 

Representation of a Distributed Database System for the Medical Purposes Using Oracle

Basam A. Mustafa; Ahmed A. Al-Saman

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 2, Pages 173-187
DOI: 10.33899/csmj.2013.163493

This research concerned with the designing and implementation of a distributed database system for the medical purposes. The system has been applied on dental clinic unit and statistics department at Al-Khansaa Educational Hospital at Mosul, and dental clinic unit at Woman Health Care Center at Mosul as a case study.
Client/server model has been used to implement the proposed system's architecture. The computers have been connected together through a local area network (LAN). Horizontal fragmentation technique has been used to distribute the database which achieved a good level of local autonomy. Oracle software were used and utilized to implement the system. It played a dramatic role in protecting data using combination of passwords and user roles hierarchies in addition to achieving transparency and data integrity concepts in the system. The proposed system simplified saving and retrieving data of dental clinics. It also provides dental clinics units  and statistics department with necessary reports and statistics. The proposed system has the ability to automatically perform daily backup for the database in addition to the manual options for database backup and recovery.
 

Applying Classical and Intelligence Techniques for Digital Image Contrast Enhancement

Alyaa taqi

AL-Rafidain Journal of Computer Sciences and Mathematics, 2008, Volume 5, Issue 2, Pages 135-158
DOI: 10.33899/csmj.2008.163990

Modern digital camera technology has produced huge services for the users from different ages and specifications .It made it easer to have images, but the user still needs to enhance those images, which have some problems when taken by the camera, for not applying enough light, as taking it in cloudy weather or on bright light or dark area or taking it from a far distance, all these reasons make the picture not clear having ambiguous details and colors. So, through this research we used some image contrast enhancement techniques to adjust the light for dark images, to make them have deep detail, sharp edges and better quality. Contrast problem is one of the most problems that face those who work on research field or normal users.
            The aim of this research is to improve the contrast of images that have bad contrast using both classical techniques and intelligence techniques. Among intelligence techniques we chose the fuzzy logic methods, to have images contain better colors all over the image and make the images look brighter. By studying the classical and fuzzy logic methods, we proposed a method named (Fuzzy Hyperbolic Threshold), the proposed method gave very good results. We applied the methods on gray, colored images and on a video, and used (Matlab 7) to implement those methods.
 

Parallel Gaussian Elimination Method

Muhammad W. Muhammad Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, 2008, Volume 5, Issue 2, Pages 59-77
DOI: 10.33899/csmj.2008.163986

The aim of the project is to develop parallel approaches for Gaussian Elimination Methods that are used in linear programming  to solve linear module  systems.
            Most of these models are time-consuming when executed and processed in the sequential microprocessor computers. During the project, we try to decrease this time and increase the efficiency of the algorithm for the Gaussian Elimination Method, through developing parallel methods appropriate to be executed on MIMD type computers.
            In this paper, three algorithms were suggested for paralleling a developed algorithm of Gaussian Elimination Method and a comparison was made between the three algorithms and the original.
            As we have been able to accelerate the three parallel methods and the speedup was one of the following:
          Speedup =  ,  no. of processor is (50)
            In general, the practical results and the suggested programs for these new algorithms proved to be better in performance than their analogues that are executed in computers of sequential processor in view of the two elements of execution time and algorithm time.
 

Evaluation of Clustering Validity

Rudhwan Yousif Sideek; Ghaydaa A.A. Al-Talib

AL-Rafidain Journal of Computer Sciences and Mathematics, 2008, Volume 5, Issue 2, Pages 79-97
DOI: 10.33899/csmj.2008.163987

Clustering is a mostly unsupervised procedure and the majority of the clustering algorithms depend on certain assumptions in order to define the subgroups present in a data set. As a consequence, in most applications the resulting clustering scheme requires some sort of evaluation as regards its validity.
            In this paper, we present a clustering validity procedure, which evaluates the results of clustering algorithms on data sets. We define a validity indexes, S_Dbw & SD, based on well-defined clustering criteria enabling the selection of the optimal input parameters values for a clustering algorithm that result in the best partitioning of a data set.
            We evaluate the reliability of our indexes experimentally, considering clustering algorithm (K_Means) on real data sets.
Our approach is performed favorably in finding the correct number of clusters fitting a data set.
 

Publisher: Mosul University

Email:  rafjcomath@gmail.com

Editor-in-chief: Professor Dr. Raida Dawood Mahmood

Managing Editor: Assistant Professor Dr. Ahmed Mohammed Ali

Print ISSN: 1815-4816

Online ISSN: 2311-7990

Keyword Cloud