About Journal

The Al-Rafidain Journal of Computer Sciences and Mathematics (CSMJ) is an international one which publishes written researches articles in English language in the areas of both computer sciences and mathematics. Contribution is open for researchers of all nationalities. One volume is published each year, and each volume consists of two issues ( June and December).
Read More ...

A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code

Nada Kasm Yahya; Zyiad Adrees Hamad Youines

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 13-25
DOI: 10.33899/csmj.2020.163511

In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1).

Build a Real-Time Home Security Alarm System Using a Kinect Sensor

Zaid A. Mundher; Khalida Basheer; Safaa Ayad Najeeb; Rami Zuhair

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 26-34
DOI: 10.33899/csmj.2020.163512

Surveillance camera systems have been widely used in homes, businesses and other places of work. These systems with its all capabilities and features provide protection to people who uses them.  In this work, a home security alarm system was designed and implemented based on the Microsoft Kinect sensor. The introduced system can detect intrusion and respond to it in real-time. If the intrusion is detected, the system sends SMS as a notification to the authorized user. Moreover, as soon as the intrusion is detected, pictures will be taken using the RGB camera of the Kinect. These pictures will be sent to the authorized user via email, and saved on the local drive. Simultaneously, the proposed system emits a loud sound to frighten away intruders. The proposed system could be used in homes, offices, warehouses, banks, hospitals, etc..
 
 

Design and Implement an Android Application to Remotely Control a Mindstorm NXT Robot

Zaid A. Mundher; Noora Ammar Salim; Baraa Abdulmunem; Raghad Muwafaq

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 35-45
DOI: 10.33899/csmj.2020.163513

Nowadays, robotics technology has become very popular in all fields of human life. Many robots have been already used in different applications such as indoor service, military undertaking, entertainment, healthcare service, etc. On the other hand, controlling robot remotely plays an important role in many areas when people cannot reach easily. Therefore, the aim of this work is to allow users to perform remote control experiments on a mobile robot through Bluetooth, Internet and SMS. The commands could be entered manually, using voice command, or using QR code. To limit the cost of the proposed system, the inexpensive (compared to more professional robot platforms) LEGO Mindstorm robot is used.
 

A New Method to Convert the DNA Sequence of Human to a QR Code

Sadoon Hussein Abdullah; Zahraa Tariq Abdulhamid

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 46-55
DOI: 10.33899/csmj.2020.163514

Data transmission, security and authenticity, nowadays is considered the major source of problems. To face these problems a suitable solution have to be forwarded . Steganography is forwarded  one of the solutions as a technique among many. This paper includes proposal for using a new technique called (Quick Respond Codes) QR Codes .
QR Codes technique is mainly used to convert and store messages since it has higher and large storage capacity, in addition to that we used, in this paper , the STR (Short Tandem Repeats) DNA sequence. STR DNA is very important because each person has its own DNA which means that security and authentication ) reliable ( are very high. The proposed  method   is to convert the hidden data (STR DNA sequence) to QR code that mean the security is at maximum. Then, by using the MD5 (Message Digest 5) Algorithm,  the result data is converted to QR code and the data within the data areas are stored in an unusually large format to make retrieval difficult.
Finally, STR DNA sequences were applied in different lengths and converted to QR code. By this method , the QR code is applied in different applications and it was very fast (3-4 second). To apply this technique and to reduce the cost, we use a webcam to get back the private (confidential) data from the QR code. The data were retrieved completely without any error because QR code is reliable and authentic. From the above result we suggest to use QR Code for indentification of  the of the individual (ID).
 

OMU: An Ontology For Mosul University

Ban Sharief Mustafa; Ibrahiem Adnan

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 56-66
DOI: 10.33899/csmj.2020.163515

Nowadays, data from different real-time data streams are coming in. The classical relational database systems cannot manage such big data. Big data should be managed in a way that keeps the semantic relations between different concepts. Ontology is a powerful tool that comes from the concept of the semantic web, can formulate data schema as semantically connected objects. Ontology can be shared and reused across different domains and sites.  In this paper, an ontology that captures the main concepts and their relationships in Mosul university is proposed. The main steps for OMU (ontology for Mosul University) development are showen using protégé ontology editor. Also, several queries are implemented to show how we can use inference engine to infer new and implicit knowledge from ontologies. visualization tools are used to visualize OMU ontology.
 

Improving Message Embedding by using some Attributes of Color Image

Ahmed Saadi Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 67-77
DOI: 10.33899/csmj.2020.163516

In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System with six cross-product nonlinearities terms, 2017], this system has three critical points employs ten terms include six quadratic cross-product nonlinearity terms,  We notice that when we apply any linear control method that relies on a single  unit control added to the system, the system behavior in this case cannot control it, so we applied enhancing linear feedback control at origin and we noticed that a necessary condition for suppression is getting positive feedback coefficient. Theoretical analysis and numerical simulation check the validity of the results obtained.
 

Studying the Bessell Equation of Complex Order

Thair Y. Thanoon; Omar Thaher shalal

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 13-27
DOI: 10.33899/csmj.2020.163517

In this paper we derive Bessel equation of complex order (n + i), after that generalized recurrence relations from Bessel equation of order (n) to Bessel equation of complex order (n + i) and will satisfy that. We given illustrates example of different cases .
 

Blind Steganalysis using One-Class Classification

Mohammed A. Karem M.; Ahmed Sami Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 28-41
DOI: 10.33899/csmj.2020.163518

Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterpart, Steganalysis, which aims to suspect and analyze the transmitted media to decide wither it contain an embedded data or not which we present in a blind Steganalysis way. One-Class Classification (OCC) machine learning algorithms aim to build classification models depending on positive class only when the negative class is not available or poorly sampled. Here in this paper we depend on a one-class support vector machines (OCSVM) which has been trained on only one class of images that is clean images class, so that the trained classifier can classify new reviews to their correct class i.e. clean or stego. Training an OCC turned to be hard work and required long execution time since classifier parameters tuning, data separation and model evaluation needed to be done manually in a brute force way. A powerful programming language (Python) with the powerful machine learning library (Scikit-Learn) gave a promising classification results in deciding whether an input image is clean or stego image.
 

Effect of Magnetic Field on Blood Flow in Stenoted Arteries

Rotaina J. Essa; Nawara J. Essa

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 42-48
DOI: 10.33899/csmj.2020.163519

In this paper, the effect of magnetic field on blood flow in stenoted arteries was studied, stokes equations in polar coordinates were used to describe such flow. All flow characteristics were found under the influence of the magnetic field and how this stenosis affects flow.
 

A Proposed Method for Feature Selection using a Binary Particle Swarm Optimization Algorithm and Mutual Information Technique

Mustafa Ayham Abed Alhafedh; Omar Saber Qasim

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 49-60
DOI: 10.33899/csmj.2020.163520

Feature selection is one of the most important issues in improving the data classification process. It greatly influences the accuracy of the classification. There are many evolutionary algorithms used for this purpose, such as the Particle Swarm Optimization (PSO) in discrete space through the Binary PSO concept. The BPSO optimization algorithm derives its mechanism from the default PSO algorithm but in discrete space. In this research, a hybrid approach was proposed between the BPSO algorithm and Mutual Information (MI) to obtain subsets of features through two basic phases: the first is to use the BPSO algorithm to determine the features affecting the data classification process by relying on an objective function. In the second phase, the MI method is used to reduce the number of features identified by the BPSO method. The results of the proposed algorithm have demonstrated efficiency and effectiveness by obtaining higher classification accuracy and using fewer features than default methods.
 

On MLGP- Rings

Raida D. mahmood; Ebtehal S. Mageed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 61-66
DOI: 10.33899/csmj.2020.163521

An ideal K of a ring R is called right (left) generalized pure (GP -ideal) if for every a ∈ K, there exists m ∈ Z+, and b ∈ K such that  am = am b ( am = b am) . A ring R is called MLGP-ring if every right maximal ideal is left GP-ideal. In this paper have been studied some new properties of MLGP-rings and the relation between this rings and strongly π-regular rings some of the main result of the present work are as follows:
1- Let R be a local ,MLGP and  SXM ring. Then:
(a)  J (R) = 0.
(b)  If R is NJ-ring. Then r(am) is a direct sum and for all ∈ R,  m ∈ Z+.
2- Let R be a local, SXM and NJ-ring . Then R is strongly π-regular if and only if R i LGP. 

Waves and Ripples in Liquid Films

Joseph G. Abdulahad; Abdulrahman M. Morshed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 1, Issue 2, Pages 187-198
DOI: 10.33899/csmj.2004.8153

In this paper we present a mathematical model for two- dimensional incompressible flow in a symmetric thin liquid films with the viscosity forces, which can be very small, compared with surface tension and inertia forces. We obtain the governing differential equation for such flow, we also determine the solution of equations and also we consider an inviscid waves in thin films.

Information Hiding Based on Chan-Vese Algorithm

Samia Sh. Lazar; Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 8, Issue 2, Pages 99-110
DOI: 10.33899/csmj.2011.7876

The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. In addition the algorithm of this technique is implemented in Matlab.

Build a Real-Time Home Security Alarm System Using a Kinect Sensor

Zaid A. Mundher; Khalida Basheer; Safaa Ayad Najeeb; Rami Zuhair

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 26-34
DOI: 10.33899/csmj.2020.163512

Surveillance camera systems have been widely used in homes, businesses and other places of work. These systems with its all capabilities and features provide protection to people who uses them.  In this work, a home security alarm system was designed and implemented based on the Microsoft Kinect sensor. The introduced system can detect intrusion and respond to it in real-time. If the intrusion is detected, the system sends SMS as a notification to the authorized user. Moreover, as soon as the intrusion is detected, pictures will be taken using the RGB camera of the Kinect. These pictures will be sent to the authorized user via email, and saved on the local drive. Simultaneously, the proposed system emits a loud sound to frighten away intruders. The proposed system could be used in homes, offices, warehouses, banks, hospitals, etc..
 
 

A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code

Nada Kasm Yahya; Zyiad Adrees Hamad Youines

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 13-25
DOI: 10.33899/csmj.2020.163511

In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1).

A Robust Spectral Three-Term Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems

Abbas Y. Al-Bayati; Sabreen M. Abbas

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 1, Pages 87-104
DOI: 10.33899/csmj.2020.163504

In this paper, we investigated a new improved Conjugate  Gradient (CG) algorithm of a Three-Term type (TTCG) based on Dai and Liao procedure to improve the CG algorithm  of (Hamoda, Rivaie, and Mamat / HRM). The new CG-algorithm satisfies both the conjugacy condition and the sufficient descent condition. The step-size of this TTCG-algorithm would be computed by accelerating the Wolfe-Powell line search technique. The proposed new TTCG algorithms have demonstrated their global affinity in certain specific circumstances given in this paper.
 

Evaluation of Clustering Validity

Rudhwan Yousif Sideek; Ghaydaa A.A. Al-Talib

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 5, Issue 2, Pages 79-97
DOI: 10.33899/csmj.2008.163987

Clustering is a mostly unsupervised procedure and the majority of the clustering algorithms depend on certain assumptions in order to define the subgroups present in a data set. As a consequence, in most applications the resulting clustering scheme requires some sort of evaluation as regards its validity.
            In this paper, we present a clustering validity procedure, which evaluates the results of clustering algorithms on data sets. We define a validity indexes, S_Dbw & SD, based on well-defined clustering criteria enabling the selection of the optimal input parameters values for a clustering algorithm that result in the best partitioning of a data set.
            We evaluate the reliability of our indexes experimentally, considering clustering algorithm (K_Means) on real data sets.
Our approach is performed favorably in finding the correct number of clusters fitting a data set.
 

Waves and Ripples in Liquid Films

Joseph G. Abdulahad; Abdulrahman M. Morshed

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 1, Issue 2, Pages 187-198
DOI: 10.33899/csmj.2004.8153

In this paper we present a mathematical model for two- dimensional incompressible flow in a symmetric thin liquid films with the viscosity forces, which can be very small, compared with surface tension and inertia forces. We obtain the governing differential equation for such flow, we also determine the solution of equations and also we consider an inviscid waves in thin films.

Design and Build a Database Management System for Computer Science Department Students

Ryan Youssef Yaacoub; Muhammad Hashem Sultan

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 8, Issue 2, Pages 85-104
DOI: 10.33899/csmj.2011.163653

Student's system has been analyzed and A database was designed according to their registration, study and lectures attending , with full documentation to their degrees, the information of undergraduate study in computer science department students – University of Mosul are used as a case study. This research use two data models to represent the database first is the Entity-Relationship Model, second is the Relational Model, Microsoft Visual FoxPro 9.0 used to create the database which contain all the related tables, a numbers of important suitable windows and reports that matches the department's needs  are created also.
 

A Robust Spectral Three-Term Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems

Abbas Y. Al-Bayati; Sabreen M. Abbas

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 1, Pages 87-104
DOI: 10.33899/csmj.2020.163504

In this paper, we investigated a new improved Conjugate  Gradient (CG) algorithm of a Three-Term type (TTCG) based on Dai and Liao procedure to improve the CG algorithm  of (Hamoda, Rivaie, and Mamat / HRM). The new CG-algorithm satisfies both the conjugacy condition and the sufficient descent condition. The step-size of this TTCG-algorithm would be computed by accelerating the Wolfe-Powell line search technique. The proposed new TTCG algorithms have demonstrated their global affinity in certain specific circumstances given in this paper.
 

A Proposed Method for Feature Selection using a Binary Particle Swarm Optimization Algorithm and Mutual Information Technique

Mustafa Ayham Abed Alhafedh; Omar Saber Qasim

AL-Rafidain Journal of Computer Sciences and Mathematics, Volume 13, Issue 2, Pages 49-60
DOI: 10.33899/csmj.2020.163520

Feature selection is one of the most important issues in improving the data classification process. It greatly influences the accuracy of the classification. There are many evolutionary algorithms used for this purpose, such as the Particle Swarm Optimization (PSO) in discrete space through the Binary PSO concept. The BPSO optimization algorithm derives its mechanism from the default PSO algorithm but in discrete space. In this research, a hybrid approach was proposed between the BPSO algorithm and Mutual Information (MI) to obtain subsets of features through two basic phases: the first is to use the BPSO algorithm to determine the features affecting the data classification process by relying on an objective function. In the second phase, the MI method is used to reduce the number of features identified by the BPSO method. The results of the proposed algorithm have demonstrated efficiency and effectiveness by obtaining higher classification accuracy and using fewer features than default methods.
 

Publisher: Mosul University

Email:  rafjcomath@gmail.com

Editor-in-chief: Professor Dr. Raida Dawood Mahmood

Print ISSN: 1815-4816

Online ISSN: 2311-7990

Keyword Cloud