About Journal

The Al-Rafidain Journal of Computer Sciences and Mathematics (CSMJ) is an international one which publishes written researches articles in English language in the areas of both computer sciences and mathematics. Contribution is open for researchers of all nationalities. One volume is published each year, and each volume consists of two issues ( June and December).
Read More ...

The Restricted Detour Polynomial of the Theta Graph

Herish O. Abdullah; Ivan D. Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 13-20
DOI: 10.33899/csmj.2020.164664

The restricted detour distance  D*(u,v) between two vertices u and v of a connected graph G is the length of a longest u - v path P in G such that <V(P)> = P. The main goal of this paper is to obtain the restricted detour polynomial of the theta graph. Moreover, the restricted detour index of the theta graph will also be obtained.

Self-Scaling Variable Metric in Constrained Optimization

Eman Hamed; Marwa W. Hamad

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 21-30
DOI: 10.33899/csmj.2020.164673

In this paper, we investigated of a new self-scaling by use quasi-Newton method and conjugate gradient method. The new algorithm satisfies a quasi-newton condition and mutually conjugate, and practically proved its efficiency when compared with the well-known algorithms in this domain, by depending on efficiency measure, number of function, number of iteration, and number of constrained, NOF, NOI and NOC.

Family GPS Tracking for Android

Mafaz M. Al-Anezi; Hisham D. Zebari; Saad N. Birfkani

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 31-38
DOI: 10.33899/csmj.2020.164674

In smart phone field, the security, tracking lost and kidnapping prevention are one of the main areas in current days. Today family members safety is more important when they are outside home. So, there is a need for a tracking system for kids where the parents can monitor their kids at anytime from anywhere.
These security goals are achieved by the Android System, Global System for Mobile (GSM), Global Positioning System (GPS) and Short Message Service (SMS) technologies.
The proposed application must be installed in all family member's smart phones, and these smart phones will use GPS services without need for internet connection, where the GPS is used to locate the child specifically and to track the child whenever he changes his place. The location obtained by only depending on GSM by sending SMS which contain a link of Google map shows the information of the position. The application also has the ability to trigger a help SMS to his parents when the child is in a dangerous situation by using his headphone, and this is considering a help message in real time.

Using Cohen Sutherland Line Clipping Algorithm to Generate 3D Models from 2D

Marah M. Taha

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 39-49
DOI: 10.33899/csmj.2020.164675

This paper provides an efficient algorithm to generate three dimensional objects from simple uncomplicated 2D environment, lead to reduce processor effort, limit of using complex mathematical operations. Most of the previous researches used the idea of ​​drawing by vanishing point to generate 3D objects from 2D environment, But the algorithm designed in this paper provides an idea of ​​how to draw three-dimensional shapes from two-dimensional drawings when applying Cohen Sutherland Line clipping algorithm, so that a basic two-dimensional shape is inserted from a set of points connected with each other must be within vision borders with a vanishing point outside of vision that is connected with all points of basic shape to consist a group of lines with partial intersections. So that any point has specific limited vision border which represents one of its coordinates of depth vertex, finally 3d object is generated when all clipping processes are completed to obtain other coordinates for all points.

The Homotopy Analysis Method in Turning Point Problems

Rasha F. Ahmed; Waleed M. Al-Hayani

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 51-65
DOI: 10.33899/csmj.2020.164676

In this paper, we used the homotopy analysis method to ordinary differential equations of type boundary value problems with a parameter representing turning points."To show the high accuracy of the solution results, we compare the numerical results applying the standard homotopy analysis method with the integral equation and the numerical solution of the Simpson and Trapezoidal rules."Also, we give the estimated order of convergence (local) and the global estimated order of convergence along the interval.

HPPD: A Hybrid Parallel Framework of Partition-based and Density-based Clustering Algorithms in Data Streams

Ammar Thaher Abd Alazeez

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 67-82
DOI: 10.33899/csmj.2020.164677

Data stream clustering refers to the process of grouping continuously arriving new data chunks into continuously changing groups to enable dynamic analysis of segmentation patterns. However, the main attention of research on clustering methods till now has been concerned with alteration of the methods updated for static datasets and changes of the available modified methods. Such methods presented only one type of final output clusters, i.e. convex or non-convex shape clusters. This paper presents a novel two-phase parallel hybrid clustering (HPPD) algorithm that identify convex and non-convex groups in online stage and mixed groups in offline stage from data stream. In this work, we first receive the data stream and apply pre-processing step to identify convex and non-convex clusters. Secondly, apply modified EINCKM to present online output convex clusters and modified EDDS to present online output non-convex clusters in parallel scheme. Thirdly, apply adaptive merging strategy in offline stage to give last composed output groups. The method is assessed on a synthetic dataset. The output results of the experiments have authenticate the activeness and effectiveness of the method.

Studying the Coefficient Curvelet for Aerial Image Segmentation

Nagham A. Sultan; Khalil I. Alsaif

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 83-95
DOI: 10.33899/csmj.2020.164880

Currently, there are many approaches for image transformations that are developed to cover the new technology in the huge amount of data treatment. In this paper, a study on Curvelet transformation coefficients was performed based on the aerial image to apply segmentation. This paper applies a lot of modifications on cut off frequencies on the filters, which is used to decompose the image on curvelet transformation. Two approaches are proposed and tested to look for the best segmentation result; the first one is based on designing filters manually, while the second evaluates the filter coefficients depending on the selected shape of the filters. The first technique gives acceptable segmentation and the second reaches the optimal result. One of the most important results is that the cut of frequency has a high effect on the segmentation; in addition, choosing filter parameters depended on the coefficients dimension of the curvelet transformation. Finally, the results show that the first approach underperformed the second one.

Design Simulation System to Simplifying Boolean Equation by using Karnaugh Map

Elham H. Aziz

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 97-115
DOI: 10.33899/csmj.2020.164680

Simulation is one of most important technique used for learning, it makes learning possible without cost and provides best way to improve the practical skills for learners. The purpose of this  research  was to design program  to simulate  processing of simplifying  Boolean expression by using kranaugh- map depending on rules and procedures applied to Boolean equation in order  minimize  it to obtain  final optimal expression with minimum  number of  variables ,and reduction in  equipment  that leads to  reduce cost,  and this research recommend to use modern methods in education which  Simulation programs is one of this method to  improve E-learning  to keep up with universities  which care to use E-learning with traditional education and make student more interactive with education progress. 

Collaboration Networks: University of Mosul Case Study

Basim Mohammed Mahmood; Nagham A. Sultan; Karam H. Thanoon; Dhiya Sh. Khadhim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 117-133
DOI: 10.33899/csmj.2020.164679

Scientific research is currently considered as one of the key factors in the development of our life. It plays a significant role in managing our business, study, and work in a more flexible and convenient way. The most important aspect when it comes to scientific research is the level of collaboration among scientific researchers. This level should be maximized as much as possible in order to obtain more reliable solutions for our everyday issues. To this end, it is needed to understand the collaboration patterns among researchers and come up with convenient strategies for strengthening the scientific collaboration. The scientific collaboration among the University of Mosul researchers–which is our case in this study–has not yet been investigated or analyzed. In this work, we aim at revealing the patterns of the scientific collaboration of the scientific colleges in the University of Mosul. We generate a co-authorship network for the university; the generated network is based on the data we collected from each individual researcher. The generated co-authorship network reveals many interesting facts regarding the collaboration patterns among the university researchers.

Medical Image Classification Using Different Machine Learning Algorithms

Sami H. Ismael; Shahab W. Kareem; Firas H. Almukhtar

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 135-147
DOI: 10.33899/csmj.2020.164682

The different types of white blood cells equips us an important data for diagnosing and identifying of many diseases. The automation of this task can save time and avoid errors in the identification process. In this paper, we explore whether using shape features of nucleus is sufficient to classify white blood cells or not. According to this, an automatic system is implemented that is able to identify and analyze White Blood Cells (WBCs) into five categories (Basophil, Eosinophil, Lymphocyte, Monocyte, and Neutrophil). Four steps are required for such a system; the first step represents the segmentation of the cell images and the second step involves the scanning of each segmented image to prepare its dataset. Extracting the shapes and textures from scanned image are performed in the third step. Finally, different machine learning algorithms such as (K* classifier, Additive Regression, Bagging, Input Mapped Classifier, or Decision Table) is separately applied to the extracted (shapes and textures) to obtain the results. Each algorithm results are compared to select the best one according to different criteria’s.

Predicting Bank Loan Risks Using Machine Learning Algorithms

Maan Y. Alsaleem; Safwan O. Hasoon

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 149-158
DOI: 10.33899/csmj.2020.164686

Bank loans play a crucial role in the development of banks investment business. Nowadays, there are many risk-related issues associated with bank loans. With the advent of computerization systems, banks have become able to register borrowers' data according their criteria. In fact, there is a tremendous amount of borrowers’ data, which makes the process of load management a challenging task. Many studies have utilized data mining algorithms for the purpose of loans classification in terms of repayment or when the loans are not based on customers’ financial history. This kind of algorithms can help banks in making grant decisions for their customers. In this paper, the performance of machine learning algorithms has been compared for the purpose of classifying bank loan risks using the standard criteria and then choosing (Multilayer Perceptron) as it has given best accuracy compared to RandomForest, BayesNet, NaiveBayes and DTJ48 algorithms.

The Pandemic COVID-19 Infection Spreading Spatial Aspects: A Network-Based Software Approach

Basim Mohammed Mahmood; Marwah M. Dabdawb

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 159-170
DOI: 10.33899/csmj.2020.164684

Coronavirus or what has been termed COVID-19 is one of the infectious diseases that have been recently classified as a pandemic. Currently, it is considered as the activist and the most dangerous disease that is rapidly spreaded around the world causing thousands of death cases. COVID-19 spreads between people through the contact with the infected ones when they sneeze, cough, or droplets of saliva. In this article, we investigated the impact of the spatial aspects and the movement patterns on COVID-19 infection spreading. We considered three aspects, namely, mobility patterns, curfew (stay-at-home) impact, and the distribution of people within places. The results show that spatial aspects can be considered as one of the factors that play a significant role in spreading the virus.

Applying Standard JPEG 2000 Part One on Image Compression

Maha Abdul Rahman Hasso; Sahlah Abed Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 13-33
DOI: 10.33899/csmj.2020.164796

In this paper, has been proposed Algorithm for standard JPEG2000 part one for image compression. The proposed Algorithm was executed by  using  MATLAB7.11  environment,  applied  these  algorithm  on  the gray and color images for type of the images natural, medical, Graphics images  and  remote  sensing.  Dependence  on  the  Peak  Signal-to-Noise Ratio  (PSNR)  for  comparing  the  result  of  the  proposed  Algorithm  by using the Daubechies filters 5/3 tap filter and 9/7 tap filter  Biothogonal , Another  comparison  is  held  concerning  the  obtained  results  of   the algorithm    of    ModJPEG  and  Color-SPECK. Proved  the  processing results Efficiency performance of   proposed Algorithm.

On MP-Rings

Raida D. Mahmood; Azhar M. Hajo

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 35-40
DOI: 10.33899/csmj.2020.164797

An ideal I of a ring R is said to be right (left) Pure if for every  , there is    such that  . A ring R is said to be right (left) MP-ring, if every maximal right (left) ideal of R is a left (right) pure. In this paper have been studied some new properties of MP-rings, there connections with strongly regular rings.
Some of the main result of the present work are as follows:
1- Let R be aright MP-ring, r(a) is a W-ideal for all  then
a- Every essential ideal is a direct summand.  
b- R is strongly regular ring. 
2- Let R be aright MP-ring. If R is right almost abelian left NBF ring, then R is strongly regular.

A New Formula for Conjugate Gradient in Unconstrained Optimization

Hussein A. Wali; Khalil K. Abbo

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 41-52
DOI: 10.33899/csmj.2020.164798

The conjugate gradient method is an important part of the methods of optimization that are not constrained by local convergence characteristics. In this research, a new formula for the conjugated coefficient is derived depending on the linear structure. The new method fulfills the regression requirement. In addition, using the Wolff search line terms, the overall convergence of the new method has been demonstrated. At the end of the research were presented numerical results that show the effectiveness of the proposed method.

Waves and Ripples in Liquid Films

Joseph G. Abdulahad; Abdulrahman M. Morshed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2004, Volume 1, Issue 2, Pages 187-198
DOI: 10.33899/csmj.2004.8153

In this paper we present a mathematical model for two- dimensional incompressible flow in a symmetric thin liquid films with the viscosity forces, which can be very small, compared with surface tension and inertia forces. We obtain the governing differential equation for such flow, we also determine the solution of equations and also we consider an inviscid waves in thin films.

Information Hiding Based on Chan-Vese Algorithm

Samia Sh. Lazar; Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 99-110
DOI: 10.33899/csmj.2011.7876

The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. In addition the algorithm of this technique is implemented in Matlab.

Build a Real-Time Home Security Alarm System Using a Kinect Sensor

Zaid A. Mundher; Khalida Basheer; Safaa Ayad Najeeb; Rami Zuhair

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 26-34
DOI: 10.33899/csmj.2020.163512

Surveillance camera systems have been widely used in homes, businesses and other places of work. These systems with its all capabilities and features provide protection to people who uses them.  In this work, a home security alarm system was designed and implemented based on the Microsoft Kinect sensor. The introduced system can detect intrusion and respond to it in real-time. If the intrusion is detected, the system sends SMS as a notification to the authorized user. Moreover, as soon as the intrusion is detected, pictures will be taken using the RGB camera of the Kinect. These pictures will be sent to the authorized user via email, and saved on the local drive. Simultaneously, the proposed system emits a loud sound to frighten away intruders. The proposed system could be used in homes, offices, warehouses, banks, hospitals, etc..

A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code

Nada Kasm Yahya; Zyiad Adrees Hamad Youines

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 13-25
DOI: 10.33899/csmj.2020.163511

In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1).

Blind Steganalysis using One-Class Classification

Mohammed A. Karem M.; Ahmed Sami Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 28-41
DOI: 10.33899/csmj.2020.163518

Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterpart, Steganalysis, which aims to suspect and analyze the transmitted media to decide wither it contain an embedded data or not which we present in a blind Steganalysis way. One-Class Classification (OCC) machine learning algorithms aim to build classification models depending on positive class only when the negative class is not available or poorly sampled. Here in this paper we depend on a one-class support vector machines (OCSVM) which has been trained on only one class of images that is clean images class, so that the trained classifier can classify new reviews to their correct class i.e. clean or stego. Training an OCC turned to be hard work and required long execution time since classifier parameters tuning, data separation and model evaluation needed to be done manually in a brute force way. A powerful programming language (Python) with the powerful machine learning library (Scikit-Learn) gave a promising classification results in deciding whether an input image is clean or stego image.

Studying the Bessell Equation of Complex Order

Thair Y. Thanoon; Omar Thaher shalal

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 13-27
DOI: 10.33899/csmj.2020.163517

In this paper we derive Bessel equation of complex order (n + i), after that generalized recurrence relations from Bessel equation of order (n) to Bessel equation of complex order (n + i) and will satisfy that. We given illustrates example of different cases .

Evaluation of Clustering Validity

Rudhwan Yousif Sideek; Ghaydaa A.A. Al-Talib

AL-Rafidain Journal of Computer Sciences and Mathematics, 2008, Volume 5, Issue 2, Pages 79-97
DOI: 10.33899/csmj.2008.163987

Clustering is a mostly unsupervised procedure and the majority of the clustering algorithms depend on certain assumptions in order to define the subgroups present in a data set. As a consequence, in most applications the resulting clustering scheme requires some sort of evaluation as regards its validity.
            In this paper, we present a clustering validity procedure, which evaluates the results of clustering algorithms on data sets. We define a validity indexes, S_Dbw & SD, based on well-defined clustering criteria enabling the selection of the optimal input parameters values for a clustering algorithm that result in the best partitioning of a data set.
            We evaluate the reliability of our indexes experimentally, considering clustering algorithm (K_Means) on real data sets.
Our approach is performed favorably in finding the correct number of clusters fitting a data set.

Representation of a Distributed Database System for the Medical Purposes Using Oracle

Basam A. Mustafa; Ahmed A. Al-Saman

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 2, Pages 173-187
DOI: 10.33899/csmj.2013.163493

This research concerned with the designing and implementation of a distributed database system for the medical purposes. The system has been applied on dental clinic unit and statistics department at Al-Khansaa Educational Hospital at Mosul, and dental clinic unit at Woman Health Care Center at Mosul as a case study.
Client/server model has been used to implement the proposed system's architecture. The computers have been connected together through a local area network (LAN). Horizontal fragmentation technique has been used to distribute the database which achieved a good level of local autonomy. Oracle software were used and utilized to implement the system. It played a dramatic role in protecting data using combination of passwords and user roles hierarchies in addition to achieving transparency and data integrity concepts in the system. The proposed system simplified saving and retrieving data of dental clinics. It also provides dental clinics units  and statistics department with necessary reports and statistics. The proposed system has the ability to automatically perform daily backup for the database in addition to the manual options for database backup and recovery.

Parallel Gaussian Elimination Method

Muhammad W. Muhammad Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, 2008, Volume 5, Issue 2, Pages 59-77
DOI: 10.33899/csmj.2008.163986

The aim of the project is to develop parallel approaches for Gaussian Elimination Methods that are used in linear programming  to solve linear module  systems.
            Most of these models are time-consuming when executed and processed in the sequential microprocessor computers. During the project, we try to decrease this time and increase the efficiency of the algorithm for the Gaussian Elimination Method, through developing parallel methods appropriate to be executed on MIMD type computers.
            In this paper, three algorithms were suggested for paralleling a developed algorithm of Gaussian Elimination Method and a comparison was made between the three algorithms and the original.
            As we have been able to accelerate the three parallel methods and the speedup was one of the following:
          Speedup =  ,  no. of processor is (50)
            In general, the practical results and the suggested programs for these new algorithms proved to be better in performance than their analogues that are executed in computers of sequential processor in view of the two elements of execution time and algorithm time.

Design a Software Engineering CASE Tool (ERToOracle10g) to transform a graphical Entity Relationship model (ER model) to Oracle10g

Nada N. Saleem; Saad Ahmed Th.

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 169-180
DOI: 10.33899/csmj.2011.163658

CASE Tools play a significant role in the field of software engineering development processes where they are utilized in system modeling and analysis, in system design and in generating automatic software codes based on system design models.
In this research the (ERToOracle10g) tool has been designed and implemented as a CASE Tool. Hence it is used to construct a data modeling using ER Model, then transforming the graphical model to (Oracle 10g) SQL instructions and executing it automatically inside an (Oracle 10g) server. XML has been used  to transform graphical ER model to SQL instructions. The graphical ER model includes symbols and shapes that are difficult to analyze or to directly generate SQL instructions. The graphical model is transformed to descriptive text using XML which is easy to analyze and transform to SQL instructions.

Publisher: Mosul University

Email:  rafjcomath@gmail.com

Editor-in-chief: Professor Dr. Raida Dawood Mahmood

Managing Editor: Assistant Professor Dr. Ahmed Mohammed Ali

Print ISSN: 1815-4816

Online ISSN: 2311-7990

Keyword Cloud