About Journal

Aims and Scopes: The Al-Rafidain Journal is an international one which publishes written researches articles in English or Arabic in the areas of both computer sciences and mathematics. Contribution is open for researchers of all nationalities. One volume of the Journal is published each year. Each volume consists of two issues,from 2013 each volume consists of four issues. Authors wishing to submit an article for publication should send their manuscript by the journal E-mail to rjcm_2003@yahoo.com as Word format. All correspondence regarding the journal should be sent to the Editorial office...
Read More ...

Journal Information

Publisher: Mosul University

Email:  rafjcomath@gmail.com

Editor-in-chief: Professor Dr. Raida Dawood Mahmood

ISSN: 1815-4816

A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code

Nada Kasm Yahya; Zyiad Adrees Hamad Youines

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 13-25
DOI: 10.33899/csmj.2020.163511

In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1)
 

Build a Real-Time Home Security Alarm System Using a Kinect Sensor

Zaid A. Mundher; Khalida Basheer; Safaa Ayad Najeeb; Rami Zuhair

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 26-34
DOI: 10.33899/csmj.2020.163512

Surveillance camera systems have been widely used in homes, businesses and other places of work. These systems with its all capabilities and features provide protection to people who uses them.  In this work, a home security alarm system was designed and implemented based on the Microsoft Kinect sensor. The introduced system can detect intrusion and respond to it in real-time. If the intrusion is detected, the system sends SMS as a notification to the authorized user. Moreover, as soon as the intrusion is detected, pictures will be taken using the RGB camera of the Kinect. These pictures will be sent to the authorized user via email, and saved on the local drive. Simultaneously, the proposed system emits a loud sound to frighten away intruders. The proposed system could be used in homes, offices, warehouses, banks, hospitals, etc..
 
 

Design and Implement an Android Application to Remotely Control a Mindstorm NXT Robot

Zaid A. Mundher; Noora Ammar Salim; Baraa Abdulmunem; Raghad Muwafaq

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 35-45
DOI: 10.33899/csmj.2020.163513

Nowadays, robotics technology has become very popular in all fields of human life. Many robots have been already used in different applications such as indoor service, military undertaking, entertainment, healthcare service, etc. On the other hand, controlling robot remotely plays an important role in many areas when people cannot reach easily. Therefore, the aim of this work is to allow users to perform remote control experiments on a mobile robot through Bluetooth, Internet and SMS. The commands could be entered manually, using voice command, or using QR code. To limit the cost of the proposed system, the inexpensive (compared to more professional robot platforms) LEGO Mindstorm robot is used.
 

A New Method to Convert the DNA Sequence of Human to a QR Code

Sadoon Hussein Abdullah; Zahraa Tariq Abdulhamid

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 46-55
DOI: 10.33899/csmj.2020.163514

Data transmission, security and authenticity, nowadays is considered the major source of problems. To face these problems a suitable solution have to be forwarded . Steganography is forwarded  one of the solutions as a technique among many. This paper includes proposal for using a new technique called (Quick Respond Codes) QR Codes .
QR Codes technique is mainly used to convert and store messages since it has higher and large storage capacity, in addition to that we used, in this paper , the STR (Short Tandem Repeats) DNA sequence. STR DNA is very important because each person has its own DNA which means that security and authentication ) reliable ( are very high. The proposed  method   is to convert the hidden data (STR DNA sequence) to QR code that mean the security is at maximum. Then, by using the MD5 (Message Digest 5) Algorithm,  the result data is converted to QR code and the data within the data areas are stored in an unusually large format to make retrieval difficult.
Finally, STR DNA sequences were applied in different lengths and converted to QR code. By this method , the QR code is applied in different applications and it was very fast (3-4 second). To apply this technique and to reduce the cost, we use a webcam to get back the private (confidential) data from the QR code. The data were retrieved completely without any error because QR code is reliable and authentic. From the above result we suggest to use QR Code for indentification of  the of the individual (ID).
 

OMU: An Ontology For Mosul University

Ban Sharief Mustafa; Ibrahiem Adnan

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 56-66
DOI: 10.33899/csmj.2020.163515

Nowadays, data from different real-time data streams are coming in. The classical relational database systems cannot manage such big data. Big data should be managed in a way that keeps the semantic relations between different concepts. Ontology is a powerful tool that comes from the concept of the semantic web, can formulate data schema as semantically connected objects. Ontology can be shared and reused across different domains and sites.  In this paper, an ontology that captures the main concepts and their relationships in Mosul university is proposed. The main steps for OMU (ontology for Mosul University) development are showen using protégé ontology editor. Also, several queries are implemented to show how we can use inference engine to infer new and implicit knowledge from ontologies. visualization tools are used to visualize OMU ontology.
 

Improving Message Embedding by using some Attributes of Color Image

Ahmed Saadi Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 67-77
DOI: 10.33899/csmj.2020.163516

In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System with six cross-product nonlinearities terms, 2017], this system has three critical points employs ten terms include six quadratic cross-product nonlinearity terms,  We notice that when we apply any linear control method that relies on a single  unit control added to the system, the system behavior in this case cannot control it, so we applied enhancing linear feedback control at origin and we noticed that a necessary condition for suppression is getting positive feedback coefficient. Theoretical analysis and numerical simulation check the validity of the results obtained.
 

Blind Steganalysis using One-Class Classification

Mohammed A. Karem M.; Ahmed Sami Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 28-41
DOI: 10.33899/csmj.2020.163518

Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterpart, Steganalysis, which aims to suspect and analyze the transmitted media to decide wither it contain an embedded data or not which we present in a blind Steganalysis way. One-Class Classification (OCC) machine learning algorithms aim to build classification models depending on positive class only when the negative class is not available or poorly sampled. Here in this paper we depend on a one-class support vector machines (OCSVM) which has been trained on only one class of images that is clean images class, so that the trained classifier can classify new reviews to their correct class i.e. clean or stego. Training an OCC turned to be hard work and required long execution time since classifier parameters tuning, data separation and model evaluation needed to be done manually in a brute force way. A powerful programming language (Python) with the powerful machine learning library (Scikit-Learn) gave a promising classification results in deciding whether an input image is clean or stego image.
 

Effect of Magnetic Field on Blood Flow in Stenoted Arteries

Rotaina J. Essa; Nawara J. Essa

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 42-48
DOI: 10.33899/csmj.2020.163519

In this paper, the effect of magnetic field on blood flow in stenoted arteries was studied, stokes equations in polar coordinates were used to describe such flow. All flow characteristics were found under the influence of the magnetic field and how this stenosis affects flow.
 

A Proposed Method for Feature Selection using a Binary Particle Swarm Optimization Algorithm and Mutual Information Technique

Mustafa Ayham Abed Alhafedh; Omar Saber Qasim

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 49-60
DOI: 10.33899/csmj.2020.163520

Feature selection is one of the most important issues in improving the data classification process. It greatly influences the accuracy of the classification. There are many evolutionary algorithms used for this purpose, such as the Particle Swarm Optimization (PSO) in discrete space through the Binary PSO concept. The BPSO optimization algorithm derives its mechanism from the default PSO algorithm but in discrete space. In this research, a hybrid approach was proposed between the BPSO algorithm and Mutual Information (MI) to obtain subsets of features through two basic phases: the first is to use the BPSO algorithm to determine the features affecting the data classification process by relying on an objective function. In the second phase, the MI method is used to reduce the number of features identified by the BPSO method. The results of the proposed algorithm have demonstrated efficiency and effectiveness by obtaining higher classification accuracy and using fewer features than default methods.
 

On MLGP- Rings

Raida D. mahmood; Ebtehal S. Mageed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 61-66
DOI: 10.33899/csmj.2020.163521

An ideal K of a ring R is called right (left) generalized pure (GP -ideal) if for every a ∈ K, there exists m ∈ , and  such that  (  ) . A ring  is called - ring if every right maximal ideal is left - ideal . In this paper have been studied some new properties of - rings and the relation between this rings and strongly - regular rings some of the main result of the present work are as follows:
1-     Let  be a local ,  and  ring . Then :
(a)  J (R) = 0 .
(b)  If  is - ring . Then  is a direct sum and for all  ,  .
2     - Let  be a local ,  and - ring . Then  is strongly - regular if and only if  i  .
 

Waves and Ripples in Liquid Films

Joseph G. Abdulahad; Abdulrahman M. Morshed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 1, Issue 2, Pages 187-198

In this paper we present a mathematical model for two- dimensional incompressible flow in a symmetric thin liquid films with the viscosity forces, which can be very small, compared with surface tension and inertia forces. We obtain the governing differential equation for such flow, we also determine the solution of equations and also we consider an inviscid waves in thin films.

Information Hiding Based on Chan-Vese Algorithm

Samia Sh. Lazar; Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 8, Issue 2, Pages 99-110

الملخصأصبحت عملية تناقل البيانات عبر الانترنت عملية سهلة نتيجة التطور الكبير في تقنيات الشبكات، وبات بإمكان الكثيرين الاتصال مع بعضهم البعض بسهولة وسرعة عبرها. ولان الانترنت بيئة عامة ومفتوحة فبإمكان أي شخص غير مخول مراقبة معلومات متناقلة بين اي طرفين واعتراضها أو الحصول عليها ولهذا ظهرت الحاجة إلى الكتابة المغطاة والتي هي علم إخفاء المعلومات السرية في غطاء رقمي مثل الصور بحيث لا يمكن للشخص العادي والغير مخول أن يكتشفه أو يراه.في هذا البحث، تم استحداث تقنية جديدة في مجال الكتابة المغطاة للإخفاء في الصور، حيث تم أولاً تقطيع الصورة الغطاء (PNG, BMP) باستخدام خوارزمية جان-فيس (Chan-Vese) ومن ثم إخفاء النص في هذه الصورة بالاعتماد على مناطق التقطيع.تم استخدام المقاييس (PSNR, BER) لقياس كفاءة التقنية. بالإضافة إلى ذلك خوارزمية هذه التقنية طبقت بـ Matlab.ABSTRACTThe process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. In addition the algorithm of this technique is implemented in Matlab.

Designing an Eelectronic Transmission System Using the Information and Communication Technology Infrastructure "A Proposed Model for the Intranet at the University of Mosul"

Raed A. Al-Dabbagh; Mustafa Z. Al-Dabbagh

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 10, Issue 2, Pages 61-80
DOI: 10.33899/csmj.2013.163486

The aim of the current study is to employing ICT in a way that supports management by establishing an electronic transmission system characterized with some features different from the previous ones through depending on open source programs which give the ability of continuous development without any costs. In addition, this system also has additional features such as operating under different operating systems.
This proposed model consists of two programs. The first one is an e-mail server provides a number of features and characteristics. The second program enables the user to apply some of the features for mailing data with big size, with high speed and secured depending on the internal mailing system (intranet) of Mosul University.
The system provides a special account with a password for each user on the services network and can also provide some features represented in stopping the undesired e-mails, checking the inbox and making sure that it is empty of viruses, resend some received e-mails for unlimited number of users on the same network, in addition to doing its normal tasks of sending and receiving e-mails; such as (writing a letters, editing and deleting). These programs can be downloaded from the internet for free and without any cost.
 

A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code

Nada Kasm Yahya; Zyiad Adrees Hamad Youines

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 13-25
DOI: 10.33899/csmj.2020.163511

In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1)
 

Image Enhancement Techniques for Images at Blur Motion and Different Noises

Sahlah Abed Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 1, Pages 48-60
DOI: 10.33899/csmj.2020.163502

Image restoration is an art to improve image quality by disposing of reducing the amount of noise and blurring present in the image. So it is one of the research titles of interest to the researchers. The images get degraded due to environmental conditions and atmospheric difference, it is therefore important to retrieve original images using different algorithms of image processing. There are widespread applications to restore images in our world today. In this research we present a new proposed method to manipulate image using median filter and has also applied inverse filter to image restoration, then combining the proposed method with inverse filter. The proposed method has been evaluated and compared with inverse Filter and with the merger by using different performance with parameters to verify efficiency and performances of these methods.
The experimental results on the test image will explain the capabilities of the proposed method to restored image, were the value of the image quality and PSNR (peak Signal to Noise ratio) is better compared with inverse filter, where values of PSNR for Lena Image is 70.3536 and for Girl Image is 71.5410 when using the proposed method of median filter, while values of PSNR when using inverse filter are 62.3225 and 62.6008 respectively when speckle noise.
 

Waves and Ripples in Liquid Films

Joseph G. Abdulahad; Abdulrahman M. Morshed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 1, Issue 2, Pages 187-198

In this paper we present a mathematical model for two- dimensional incompressible flow in a symmetric thin liquid films with the viscosity forces, which can be very small, compared with surface tension and inertia forces. We obtain the governing differential equation for such flow, we also determine the solution of equations and also we consider an inviscid waves in thin films.

Information Hiding Based on Chan-Vese Algorithm

Samia Sh. Lazar; Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 8, Issue 2, Pages 99-110

الملخصأصبحت عملية تناقل البيانات عبر الانترنت عملية سهلة نتيجة التطور الكبير في تقنيات الشبكات، وبات بإمكان الكثيرين الاتصال مع بعضهم البعض بسهولة وسرعة عبرها. ولان الانترنت بيئة عامة ومفتوحة فبإمكان أي شخص غير مخول مراقبة معلومات متناقلة بين اي طرفين واعتراضها أو الحصول عليها ولهذا ظهرت الحاجة إلى الكتابة المغطاة والتي هي علم إخفاء المعلومات السرية في غطاء رقمي مثل الصور بحيث لا يمكن للشخص العادي والغير مخول أن يكتشفه أو يراه.في هذا البحث، تم استحداث تقنية جديدة في مجال الكتابة المغطاة للإخفاء في الصور، حيث تم أولاً تقطيع الصورة الغطاء (PNG, BMP) باستخدام خوارزمية جان-فيس (Chan-Vese) ومن ثم إخفاء النص في هذه الصورة بالاعتماد على مناطق التقطيع.تم استخدام المقاييس (PSNR, BER) لقياس كفاءة التقنية. بالإضافة إلى ذلك خوارزمية هذه التقنية طبقت بـ Matlab.ABSTRACTThe process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. In addition the algorithm of this technique is implemented in Matlab.

A Robust Spectral Three-Term Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems

Abbas Y. Al-Bayati; Sabreen M. Abbas

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 1, Pages 87-104
DOI: 10.33899/csmj.2020.163504

In this paper, we investigated a new improved Conjugate  Gradient (CG) algorithm of a Three-Term type (TTCG) based on Dai and Liao procedure to improve the CG algorithm  of (Hamoda, Rivaie, and Mamat / HRM). The new CG-algorithm satisfies both the conjugacy condition and the sufficient descent condition. The step-size of this TTCG-algorithm would be computed by accelerating the Wolfe-Powell line search technique. The proposed new TTCG algorithms have demonstrated their global affinity in certain specific circumstances given in this paper.
 

A Proposed Method for Feature Selection using a Binary Particle Swarm Optimization Algorithm and Mutual Information Technique

Mustafa Ayham Abed Alhafedh; Omar Saber Qasim

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 49-60
DOI: 10.33899/csmj.2020.163520

Feature selection is one of the most important issues in improving the data classification process. It greatly influences the accuracy of the classification. There are many evolutionary algorithms used for this purpose, such as the Particle Swarm Optimization (PSO) in discrete space through the Binary PSO concept. The BPSO optimization algorithm derives its mechanism from the default PSO algorithm but in discrete space. In this research, a hybrid approach was proposed between the BPSO algorithm and Mutual Information (MI) to obtain subsets of features through two basic phases: the first is to use the BPSO algorithm to determine the features affecting the data classification process by relying on an objective function. In the second phase, the MI method is used to reduce the number of features identified by the BPSO method. The results of the proposed algorithm have demonstrated efficiency and effectiveness by obtaining higher classification accuracy and using fewer features than default methods.
 

Keyword Cloud