Main Subjects : Computer Science


Data Modeling and Design Implementation for CouchDB Database

Shaymaa Ahmed Razoqi

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 39-55
DOI: 10.33899/csmj.2021.168252

In the modern database environment, new non-traditional database types appear that are Not SQL database (NoSQL). This NoSQL database does not rely on the principles of the relational database. Couchdb is one of the NoSQL Document-Oriented databases, in Couchdb the basic element was a document. All types of databases have the same conceptual data model and it was deferent in the logical and physical model, this mean UML class diagram can be used in the  NoSQL design at a conceptual level, that is, it can be used to design a Couchdb database. In this research, we suggest a method to model and implement the conceptual level of the Couchdb database from the UML class diagram in using simple way depending on the association types. Depending on the types of relationships between classes, we can have more than one database model to choose from and find the most suitable for the system to be designed. A medical clinic database was proposed to implement the transfer steps according to the proposed method. Three database models were designed and implemented to study the suitability of the proposed transfer method.

Survey on Human Activity Recognition using Smartphone

Adeeba KH; Laheeb M. Ibrahim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 55-67
DOI: 10.33899/csmj.2021.168253

The field of Human Activity Recognition (HAR) is an active research field in which methods are being developed to understand human behavior by interpreting features obtained from various sources, these activities can be recognized using interactive sensors that are affected by human movement. Sensor can embed elements within Smartphones or Personal Digital Assistants (PDAs). The great increase in smart phone users and the increase in the sensor ability of these smart phones, and users usually carry their smartphones with them. This fact makes HAR more important and accepted.
In this survey, A number of previous studies were studied and analyzed, where we prepared a comparison of the research works conducted over the period 2010-2020 in human activity recognition using Smartphone sensors. Comparison charts highlight their most important aspects such as a type of sensor used, activities, sensor placement, HAR- system type (offline, online), computing device, classifier (type of algorithms) and system accuracy levels.
 

Designing an Electronic Platform for the Distribution and Managing Undergraduate Projects

Osama O. Mohammed; Shayma Mustafa Mohi-Aldeen

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 159-177
DOI: 10.33899/csmj.2021.168267

Our study in this research came as a proposal for an electronic platform to manage projects that graduate the fourth stage through which all tasks were transferred from the traditional system to an electronic system. As the system collects project proposals by the teachers and follows up the process of selecting them by the students, then managing the discussion process and sending the evaluation electronically by the members of the discussion committees and by connecting to the internal network (Router) via mobile or computer to the main database so that the system administrator prints the results The evaluation is processed electronically and submitted to the examination committee. The system was developed structurally according to the principle of the server and the client, and the wireless network was used to connect the system devices to transfer information between the server and the client. The system provided a protection method for system information and a way for users to enter, relying on efficient investigation methods to ensure safe access to all system interfaces. The system was tested on real information for the Computer Science Department, and the system showed its efficiency in achieving the required goals, completing the tasks, and issuing results accurately, quickly and without errors. Programming languages used in the design (C # for design interfaces + SQL Server for distributed database + PHP for web pages)
 

Study the Relationship between the University Student and Teacher using the Principal Component Analysis and Genetic Algorithms

Sahar E. Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 75-100
DOI: 10.33899/csmj.2021.168262

Multivariate data analysis is one of the popular techniques, and among them is the Principal Component Analysis, or PCA, is a dimensionality-reduction method which is the process of converting a large number of related variables to a smaller number of unrelated factors, that still contains most of the information in the large set. Therefore, any phenomenon that consist of a large group of variables that are difficult to treat with in their initial form. The process of the interpreting these variables become complex process, so reducing these variables to a smaller is easier to deal with which is the aspiration of every researcher working in the field of principal component analysis. In this research, a multivariate data collection process was carried out which are relates to the nature of education and the relationship between the university student and the teacher, then studying and analyzing by Principal component analysis model, which is a technique used to summarize and condense data through the use of bonding software SPSS,2020.
Thus, it will be illustrious that this research will fall into a concept Data Mining, and is also abbreviated, and then it is realized using genetic algorithms procedure, in latest version MATLAB 2019B, Application of Genetic Algorithms using simulation software with latest release MATLAB 2019, using the Multiple linear regression equation method.
Multiple linear regression procedure to find the arrangement of independent variables within each factor of the factors obtained, by calculating the weight of the independent variable (Beta). Overall results were obtained for the eigenvalues of the stored correlation matrix, and the study required a Statistical analysis (PCA) method, and by reducing the number of the variables without losing much information about the original variables. The goal is to simplify their understanding. The disclosure of its structure and interpretation, in addition to reaching a set of conclusions that were discussed in detail, In addition to important recommendation.
 

Study on Turning Arabic Text into Spoken Words

Abdulwahhab F. Shareef; Riyadh Z. Mahmoud

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 197-209
DOI: 10.33899/csmj.2021.168269

Language was a means of communication between members of a single community, so that some of them would express to each other their ideas and thoughts, and a common characteristic of that society was defined, and the origin of the word was derived from (rhetoric, idle), if he repealed the matter and spoke about it, and the ancients knew it that language: (It is what expresses It contains all the people for their belongings). The ancients went in their definition of a language to the characteristics of their language with which they communicate, without referring to the Arabic language as a language among the living languages ​​that are circulating among them. Arabs and Arabs (whoever inhabited the country and its island, or uttered the language of its people), and to it returns the percentage of the Arabic language, which is one of the Semitic languages. Which spread in the Arabian Peninsula, and the writing came to denote what is in the minds of notables.
This research presents a computer application that depends on human input to pronounce the Arabic letters
The system consists of two phases, the first stage is the axis of creating a database for Arabic language characters and their storage locations, as well as the type of formulas for those letters when the initial processing was performed.
The second stage is the process of comparing the entered letter from the text with the corresponding sound and placing it in a storage so that we can then process it. In the practical part of the research, we used a comparison between the results of four methods to obtain the least possible execution time with the least pauses in speech, which are the combinative method, the smoothing method, the method of nesting speech, and a hybrid method between smoothing and interfering together.
We start by entering in the input text box and using the SpellLetter function, which we use for the purpose of processing and pronunciation, where the input is of three types, either it is a char, or it is an array of characters (String), or it is numbers between zero and nine Num), and in the case that the entry was not For these three types, the entry is wrong, for example, non-Arabic letters or special symbols, for example.,And if the entry was correct, each letter is taken with its accent. This means that we take two positions each time.
Using Matlab (R 2018a) to build the proposed system and it was implemented using a computer. Portable running under the environment of the operating system (Microsoft Windows 10).
 

Analyzing Crime Networks: A Complex Network-Based Approach

Husam B. Sultan; Basim Mohammed Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 57-73
DOI: 10.33899/csmj.2021.168261

This article analyzed the crime network of Nineveh province based on the concepts of Complex Networks. To this end, two networks were created; the first represented the crimes that were committed in Nineveh province, while the second was the network of crime regions. These two networks were visualized and then analyzed using network centrality measurements. The results showed that several pairs of crimes had strong relations to each other. Moreover, it was found that some crime regions were considered as the core of crimes in the province. The results also showed that few regions were considered as the most dangerous parts of the province and they had strong tendencies to replicate their behaviour to other regions. Finally, the authors believe this is the first kind of works that take the crime network of Nineveh province as a case study

Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm

Mohammad S. Hashim; Melad jader saeed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 147-158
DOI: 10.33899/csmj.2021.168266

Local networks and the Internet increase day by day, and a large amount of information is transferred across these networks every day resulting in a dramatic increase in the information security threats.
Therefore, it was necessary to use the techniques that ensure the security and the confidentiality of the transferred information. Secret writing is a general term which is used to refer to the protection of information from attackers, and it includes two types of widely used technologies: cryptography and steganography.
The research has presented a security model that fulfils the requirements of confidentiality and safety of the data transferred between the parties of the communication process. This model includes two phases that aim to provide a high level of confidentiality and security for the secret text. New methods have been used to combine cryptography with steganography to attain a high level of secrecy and security where the secret text was encrypted in an innovative and modified way by encoding DNA (Deoxyribo Nucleic Acid( and hiding the resulting encrypted text inside images by means of EMD) Exploiting Modification Direction) method.
This method has been applied on a number of images and texts, and the measurement of PNSR (88.5382, 87.0293, 97.8257), MSE (0.000015, 0.000019, 0.00004), CO (0) and Q-Factor (0.3521,3458,0.3354) values in the resulting hidden images have been yielded good results.
 

Using Ant Algorithm to Find the Optimal Critical Path of a Projects Network

Ziyad A. Mohammed; Sama T. Al_Obaidy

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 115-130
DOI: 10.33899/csmj.2021.168264

Intelligent techniques to solve the problem of decision-making in project management, apart from the methods of operations research, the choice was made on one of the algorithms of crowd intelligence represented by the Ant Colony Optimization  algorithm (ACO)to solve the matter of finding the optimal critical path for the enterprise business network because the business network is more Networks tradition the behavior of the ant colony system to find the optimal critical path for the Critical Path Network(CPN) as. You own a project beginning contract (the first event) equivalent to an ant hill.The project end contract (the last event) is equivalent to the food site.The matter of finding the optimal critical path for the project is equivalent to the search process to find an optimal (the shortest) path between the nest and the food site.
The program ANTOCPN, written in Matlab language on a virtual business network. The program is featuring by its efficiency, accuracy of results, and the possibility of applying it to any business network, regard of the degree of complexity in terms of the number of paths (activities), whether real or imaginary, smoothly and easily. Also, the results of the ANTOCPN algorithm program were compared with the results of the genetic algorithm program for the same question GAOCPN for previous research, and the ant algorithm proved its worth in terms of speed in obtaining the optimal solution.
 

Comparison Study for Three Compression Techniques (Wavelet, Contourlet and Curvelet Transformation)

Shahad M. Sulaiman; Hadia Saleh Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 101-114
DOI: 10.33899/csmj.2021.168263

Researches and studies on compressing digital images are aiming to make it easier to deal with networks, communications and Internet by reducing the size of the multimedia files transferred, and reducing the execution time and transmission time. In this research, the lossy compression method was adopted as one of the solutions that reduce the size of the data required to compress the image, through the process of compression of digital image data using Discrete Wavelet Transform algorithms using Haar filter, and Contourlet. Using Laplace and Directional Filter, Curvelet transformation using FDCT- Wrapping Technology .The performance of the algorithms used in the proposed research is also evaluated using a Ratio Compression (RC) scale, As well as the Peak signal to noise ratio (PSNR) scale, the mean sequence error (MSE) scale, the signal to noise ratio (SNR) scale, and finally, the Normalization correlation (NC) scale. Correspondence between the original image and the recovered image after compression, in order to choose the best algorithm that achieves the best compression ratio of the image and maintains the parameters of the recovered image based on the standards (MSE, PSNR, SNR, COR and CR) used with the three algorithms, and the results showed that the Curvelet transformation algorithm achieved : best compression ratio, but at the expense of image quality.
 

Electronic System for Managing Theses of Computer Science College

Dhafar H. Al-Ali; Auday Hashim Saeed Al Wattar

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 179-195
DOI: 10.33899/csmj.2021.168268

This research paper includes designing and implementing of an Electronic system for  managing theses of  College of Computer Science and Mathematics, University of Mosul, using replication, C # language and MS SQL Server 2008 databases to be a stable work basis that can be relied upon in the departments’ work as it facilitates the higher administrative bodies in the departments and the deanship Obtaining the required results quickly and accurately, which facilitates and contributes to making the right decisions at the appropriate time and required with the ease of preparing special reports for each student, lecturer and thesis and printing them which it will help the departments head and the scientific committee to complete them if requested, as well as provide various statistics, and to improve administrative efficiency for thesis, the problem of losing thesis data and preserving it from human and natural disasters has been overcome by applying the principle of replication.
 

A Multimedia Medical Expert System for Human Diseases Diagnosis

Ahmed Kh. Ameen; Baydaa Ibraheem Khaleel

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 131-146
DOI: 10.33899/csmj.2021.168265

With the great expansion and development of computer science and its systems. Its applications are used in most areas of life, which facilitated the solution of many simple and complex issues, as it was used in multiple fields, including the medical field, where computer applications were designed to help the specialist doctor in his work and reduce the time in diagnosis. In this research, an expert system is built, which is one of the artificial intelligence techniques, using the advanced (forward) sequencing algorithms also called data-directed inference, and the algorithm. Backward (backward) sequence, also called target-directed inference, to diagnose the most common diseases to which a person is exposed. It is supported by multimedia, which includes (text, images, audio, and video) to reach a solution to the problem through dialogue with the user and rely on the stored knowledge as a base on which the inference engine represented by the two algorithms to reach to solutions, instructions and recommendations to diagnose the disease and give the appropriate treatment. These solutions are given to users in several forms using multimedia (text, pictures, audio and video) and this system is used by people who cannot reach a doctor or hospital for any reason. This system consists of major parts, which are the knowledge base that organizes the collection of facts the laws and the inference engine, which in turn include the Forward Chaining and Backward Chaining algorithms.
These diseases in order to reach a diagnosis of the disease with high accuracy, and this leads to reducing medical errors. The proposed system can be used as a substitute for the doctor in diagnosing some diseases in general and some diseases in particular. Which is useful in cases where the doctor is absent due to natural conditions or emergency situations, or when it is difficult for the patient to reach hospitals or health centers.
 

A Comparative Study of Methods for Separating Audio Signals

Riham J. Issa; Yusra Mohammad

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 39-49
DOI: 10.33899/csmj.2020.167345

The process of separating signal from a mixture of signals represents an essential task for many applications including sound signal processing and speech processing systems as well as medical signal processing. In this paper, a review of sound source separation problem has been presented, as well as the methods used to extract features from the audio signal, also, we define the Blind source separation problem and comparing between some of the methods used to solve the problem of source separation.
 

Maintainability Prediction for Object-Oriented Software Systems Based on Intelligent Techniques: Literature Review

anfal abd fadhil; Taghreed Riyadh Alreffaee

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 97-111
DOI: 10.33899/csmj.2020.167342

The maintainability of the software is one of the most substantial aspects when assessing software product quality. It is known as the easiness with which the current software can be changed. In the literature, a great number of models have been suggested to predict and measure maintainability during various stages of the Software Development Life Cycle, to conduct a comparative study of the existing suggested models of the prediction, only few attempts have been done. This study hints at the basics about the manner of how to measure maintainability in the object-oriented (OO) design knowing that the maintainability will be measured differently at every level. Also, we will concentrate on the artificial intelligence technologies of these studies.
 

The Impact of Mobility Models on the Consumption of Network Resources in the Internet of Things (IoT)

Rasha J. Al-Jarah; Basim Mohammed Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 51-69
DOI: 10.33899/csmj.2020.167346

Nowadays, the field of Internet of Things (IoT) has become a new trend and one of the most attractive areas of research. It has a wide range of applications; starting from smart devices to developing smart cities. The main issue in this kind of applications is the limitation in network resources (e.g., energy, memory, connectivity, etc.). Most of the works in the literature deal with this issue in a traditional way. For instance, developing routing protocols that find the optimal path for data forwarding. This paper looks to this issue from a different angle. In this work, we aim at testing different mobility patterns and then investigate their impact of the consumption of network resources under particular distributions and data routing protocols. The aspect we aim to investigate and measure is the amount of data exchanged, which in turn affects the power and the memory consumption of a network. We also measure two more aspects; performance stability, and data coverage area. The results show that mobility models play a significant role in the overall network performance.
 

The Linguistic Connotations of the Word Light in the Holy Quran (An analytical study of Quranic verses using Artificial intelligent techniques)

Nima A. Al-Fakhry

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 13-24
DOI: 10.33899/csmj.2020.167343

The Holy Quran is a sea of words, articulations, phrases, regulations, laws, and judgments. Therefore, when we dive in the Quran verses we need a large amount of information in various aspects to achieve the required knowledge. The word (Al-Noor) is one of the Quran's vocabularies, which enjoys a special place, and this privacy came from the specificity of the Quran and its sanctity. The word (Al-Noor) has one pronunciation and many meanings and vocabulary.
The research has sought to know God's lights: “the science, the guidance, the kernels, and faith “the closest and most intense and congregated of the verse (35/Al-Noor).  Furthermore, this verse was chosen due to it speaks about the Sultan of Allah Almighty and god's light. Finally, the research has used the algorithm of “subtractive clustering and weighted subtractive clustering” measured and Matlab language (2013) to achieve the practical aspect of the study.
 

Palm Print Features for Personal Authentication Based On Seven Moments

Khaleda B. Ali; Khalil I. Alsaif

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 63-74
DOI: 10.33899/csmj.2020.167339

Biometric images are considered as one of the major coefficients in the field of personal authentication. One of the main approaches for personal identification is based on palm print. So studying the features extracted from palm print image adopted to get high efficient system for any recognition systems. In this research two major phases are hold on, in the first phase a database was built for 100 persons by acquiring four images for both hands (4 for left hand and 4 for right hand), then processed to extract ROI (region of interest) by looking for the palm centroid then a square area is fixed based on that centroid. The pre-process play an important step for stable features. Evaluation of the seven moments for each image (8 images) follow the preprocess then stored in the database file (so each person will have 56 values), this phase called personal database preparation. The second phase is the detection phase, which requires the same steps to get 56 values then go through the database looking for the closest person to the tested one. The system evaluation measured by statistical metrics which show good result goes up to 95.7% when applied on 50 persons with different conditions. Also the effect of ROI dimension with individual hands and integrated both of them studied, and the recommended dimension is 192*192.

Smart Agriculture; Farm Irrigation System Using IoT

Amera Istiqlal Badran; Manar Y. Kashmoola

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 75-83
DOI: 10.33899/csmj.2020.167340

          Due to the increase of development in modern technology which entered in most fields of life including sustainable agriculture; most studies revealed that most lesions result from over irrigation which causes fungi in plant and soil salinity. Recently; some very important terms emerged and changed most agricultural concepts such as the sustainable agriculture, green cities and smart irrigation systems. Most of these systems improved the quality of production and reduced lesions. In this paper a smart irrigation system was designed depending on Field Capacity F.C value, Wilting Point W.P value. In addition to the ranges of moisture that are measured in the field which are important in decision making of irrigation and selecting the best values to rely on such as threshold value in designing for the sake of maintaining moisture in the soil permanently. The best field moisture value was recorded when designing was %24 at threshold value in a clay soil field. Finally; the best types of microcontrollers ESP8266 & ESP-32S and moisture sensors, which are  used to upload the data to Adafruit server. Also, the fast and light Message Queuing Telemetry Transport (MQTT) protocol, was used to transfer the ranges of moisture through the system and cloud computing.
 

Nineveh Blood: Android Based Blood Donation Application for Nineveh Governorate in Iraq

Ahmed Mostfa; Aya A. Alabass; Abdel-Nasser Sharkawy

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 85-96
DOI: 10.33899/csmj.2020.167341

Blood donation (BD) is one of the most significant contributions that a person can make towards the society. The growing android technology has made the process of BD easier and hassle-free. The Nineveh blood bank is an android application made for such great and noble cause. The application connects the givers and the requesters of blood who live in the Nineveh province, Iraq. The blood requester can serach from a list of all donors who have the same blood group and directly contact them without any third-party involvement. The Nineveh Blood application creates giver’s/requester’s profile through the Google Firebase Real-time database. In which, a one WebSocket two-way channel can constantly send the data back-and-forth between the server and the clients, and store the data as a JavaScript Object Notation (JSON) file.  
 

Improving Performance of Projector with the Protection of the Eyes while using a Smart Board

Abdulrafa H. Maree

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 2, Pages 53-62
DOI: 10.33899/csmj.2020.167338

One of the most important problems that a teacher faces when using a smart board in the teaching process is the fall of a strong light beam from the projector on their faces and bodies. The focus of this light is harmful to the human eye, which leads to temporary blindness when it falls directly on the eye. It also leads to harmful side effects. The light falling on the presenter body will make the picture on the screen looks unprofessional and unclear and distract the attention of the students. Solving this problem will led to better lectures delivering for both the teachers and the student.
In this study, a system is designed to track the movement of the teacher using an infrared transmitter that is attached to the teacher’s freshness or head cap. Electronic signals directed to an infrared receiver are installed on the front of the projector device in order to send these signals to the computer for analysis according to the proposed algorithms to determine the teacher face position. A black shade square) is placed in the designated and displayed on the smart board where the lighting will decrease on the face and eyes of the teacher, as this shade will be moving with the movement of the transmitter. This method aims to protect the teacher’s eyes from the harmful strong light.
 

Using Cohen Sutherland Line Clipping Algorithm to Generate 3D Models from 2D

Marah M. Taha

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 39-49
DOI: 10.33899/csmj.2020.164675

This paper provides an efficient algorithm to generate three dimensional objects from simple uncomplicated 2D environment, lead to reduce processor effort, limit of using complex mathematical operations. Most of the previous researches used the idea of ​​drawing by vanishing point to generate 3D objects from 2D environment, But the algorithm designed in this paper provides an idea of ​​how to draw three-dimensional shapes from two-dimensional drawings when applying Cohen Sutherland Line clipping algorithm, so that a basic two-dimensional shape is inserted from a set of points connected with each other must be within vision borders with a vanishing point outside of vision that is connected with all points of basic shape to consist a group of lines with partial intersections. So that any point has specific limited vision border which represents one of its coordinates of depth vertex, finally 3d object is generated when all clipping processes are completed to obtain other coordinates for all points.

Medical Image Classification Using Different Machine Learning Algorithms

Sami H. Ismael; Shahab W. Kareem; Firas H. Almukhtar

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 135-147
DOI: 10.33899/csmj.2020.164682

The different types of white blood cells equips us an important data for diagnosing and identifying of many diseases. The automation of this task can save time and avoid errors in the identification process. In this paper, we explore whether using shape features of nucleus is sufficient to classify white blood cells or not. According to this, an automatic system is implemented that is able to identify and analyze White Blood Cells (WBCs) into five categories (Basophil, Eosinophil, Lymphocyte, Monocyte, and Neutrophil). Four steps are required for such a system; the first step represents the segmentation of the cell images and the second step involves the scanning of each segmented image to prepare its dataset. Extracting the shapes and textures from scanned image are performed in the third step. Finally, different machine learning algorithms such as (K* classifier, Additive Regression, Bagging, Input Mapped Classifier, or Decision Table) is separately applied to the extracted (shapes and textures) to obtain the results. Each algorithm results are compared to select the best one according to different criteria’s.
 

Family GPS Tracking for Android

Mafaz M. Al-Anezi; Hisham D. Zebari; Saad N. Birfkani

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 31-38
DOI: 10.33899/csmj.2020.164674

In smart phone field, the security, tracking lost and kidnapping prevention are one of the main areas in current days. Today family members safety is more important when they are outside home. So, there is a need for a tracking system for kids where the parents can monitor their kids at anytime from anywhere.
These security goals are achieved by the Android System, Global System for Mobile (GSM), Global Positioning System (GPS) and Short Message Service (SMS) technologies.
The proposed application must be installed in all family member's smart phones, and these smart phones will use GPS services without need for internet connection, where the GPS is used to locate the child specifically and to track the child whenever he changes his place. The location obtained by only depending on GSM by sending SMS which contain a link of Google map shows the information of the position. The application also has the ability to trigger a help SMS to his parents when the child is in a dangerous situation by using his headphone, and this is considering a help message in real time.

HPPD: A Hybrid Parallel Framework of Partition-based and Density-based Clustering Algorithms in Data Streams

Ammar Thaher Abd Alazeez

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 67-82
DOI: 10.33899/csmj.2020.164677

Data stream clustering refers to the process of grouping continuously arriving new data chunks into continuously changing groups to enable dynamic analysis of segmentation patterns. However, the main attention of research on clustering methods till now has been concerned with alteration of the methods updated for static datasets and changes of the available modified methods. Such methods presented only one type of final output clusters, i.e. convex or non-convex shape clusters. This paper presents a novel two-phase parallel hybrid clustering (HPPD) algorithm that identify convex and non-convex groups in online stage and mixed groups in offline stage from data stream. In this work, we first receive the data stream and apply pre-processing step to identify convex and non-convex clusters. Secondly, apply modified EINCKM to present online output convex clusters and modified EDDS to present online output non-convex clusters in parallel scheme. Thirdly, apply adaptive merging strategy in offline stage to give last composed output groups. The method is assessed on a synthetic dataset. The output results of the experiments have authenticate the activeness and effectiveness of the method.

Design Simulation System to Simplifying Boolean Equation by using Karnaugh Map

Elham H. Aziz

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 97-115
DOI: 10.33899/csmj.2020.164680

Simulation is one of most important technique used for learning, it makes learning possible without cost and provides best way to improve the practical skills for learners. The purpose of this  research  was to design program  to simulate  processing of simplifying  Boolean expression by using kranaugh- map depending on rules and procedures applied to Boolean equation in order  minimize  it to obtain  final optimal expression with minimum  number of  variables ,and reduction in  equipment  that leads to  reduce cost,  and this research recommend to use modern methods in education which  Simulation programs is one of this method to  improve E-learning  to keep up with universities  which care to use E-learning with traditional education and make student more interactive with education progress. 

Collaboration Networks: University of Mosul Case Study

Basim Mohammed Mahmood; Nagham A. Sultan; Karam H. Thanoon; Dhiya Sh. Khadhim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 117-133
DOI: 10.33899/csmj.2020.164679

Scientific research is currently considered as one of the key factors in the development of our life. It plays a significant role in managing our business, study, and work in a more flexible and convenient way. The most important aspect when it comes to scientific research is the level of collaboration among scientific researchers. This level should be maximized as much as possible in order to obtain more reliable solutions for our everyday issues. To this end, it is needed to understand the collaboration patterns among researchers and come up with convenient strategies for strengthening the scientific collaboration. The scientific collaboration among the University of Mosul researchers–which is our case in this study–has not yet been investigated or analyzed. In this work, we aim at revealing the patterns of the scientific collaboration of the scientific colleges in the University of Mosul. We generate a co-authorship network for the university; the generated network is based on the data we collected from each individual researcher. The generated co-authorship network reveals many interesting facts regarding the collaboration patterns among the university researchers.

Applying Standard JPEG 2000 Part One on Image Compression

Maha Abdul Rahman Hasso; Sahlah Abed Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 13-33
DOI: 10.33899/csmj.2020.164796

In this paper, has been proposed Algorithm for standard JPEG2000 part one for image compression. The proposed Algorithm was executed by  using  MATLAB7.11  environment,  applied  these  algorithm  on  the gray and color images for type of the images natural, medical, Graphics images  and  remote  sensing.  Dependence  on  the  Peak  Signal-to-Noise Ratio  (PSNR)  for  comparing  the  result  of  the  proposed  Algorithm  by using the Daubechies filters 5/3 tap filter and 9/7 tap filter  Biothogonal , Another  comparison  is  held  concerning  the  obtained  results  of   the algorithm    of    ModJPEG  and  Color-SPECK. Proved  the  processing results Efficiency performance of   proposed Algorithm.
 

The Pandemic COVID-19 Infection Spreading Spatial Aspects: A Network-Based Software Approach

Basim Mohammed Mahmood; Marwah M. Dabdawb

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 159-170
DOI: 10.33899/csmj.2020.164684

Coronavirus or what has been termed COVID-19 is one of the infectious diseases that have been recently classified as a pandemic. Currently, it is considered as the activist and the most dangerous disease that is rapidly spreaded around the world causing thousands of death cases. COVID-19 spreads between people through the contact with the infected ones when they sneeze, cough, or droplets of saliva. In this article, we investigated the impact of the spatial aspects and the movement patterns on COVID-19 infection spreading. We considered three aspects, namely, mobility patterns, curfew (stay-at-home) impact, and the distribution of people within places. The results show that spatial aspects can be considered as one of the factors that play a significant role in spreading the virus.

Studying the Coefficient Curvelet for Aerial Image Segmentation

Nagham A. Sultan; Khalil I. Alsaif

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 83-95
DOI: 10.33899/csmj.2020.164880

Currently, there are many approaches for image transformations that are developed to cover the new technology in the huge amount of data treatment. In this paper, a study on Curvelet transformation coefficients was performed based on the aerial image to apply segmentation. This paper applies a lot of modifications on cut off frequencies on the filters, which is used to decompose the image on curvelet transformation. Two approaches are proposed and tested to look for the best segmentation result; the first one is based on designing filters manually, while the second evaluates the filter coefficients depending on the selected shape of the filters. The first technique gives acceptable segmentation and the second reaches the optimal result. One of the most important results is that the cut of frequency has a high effect on the segmentation; in addition, choosing filter parameters depended on the coefficients dimension of the curvelet transformation. Finally, the results show that the first approach underperformed the second one.

Predicting Bank Loan Risks Using Machine Learning Algorithms

Maan Y. Alsaleem; Safwan O. Hasoon

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 149-158
DOI: 10.33899/csmj.2020.164686

Bank loans play a crucial role in the development of banks investment business. Nowadays, there are many risk-related issues associated with bank loans. With the advent of computerization systems, banks have become able to register borrowers' data according their criteria. In fact, there is a tremendous amount of borrowers’ data, which makes the process of load management a challenging task. Many studies have utilized data mining algorithms for the purpose of loans classification in terms of repayment or when the loans are not based on customers’ financial history. This kind of algorithms can help banks in making grant decisions for their customers. In this paper, the performance of machine learning algorithms has been compared for the purpose of classifying bank loan risks using the standard criteria and then choosing (Multilayer Perceptron) as it has given best accuracy compared to RandomForest, BayesNet, NaiveBayes and DTJ48 algorithms.

Information Hiding Based on Chan-Vese Algorithm

Samia Sh. Lazar; Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 99-110
DOI: 10.33899/csmj.2011.7876

The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. In addition the algorithm of this technique is implemented in Matlab.

A Hybrid Ant Colony Optimization Algorithm to Solve Assignment Problem by Hungarian Method

Isra N. Alkallak

AL-Rafidain Journal of Computer Sciences and Mathematics, 2009, Volume 6, Issue 2, Pages 159-175
DOI: 10.33899/csmj.2009.163805

This research studied ant colony optimization with optimization problem as an assignment model problem by Hungarian method. The proposed heuristic algorithm simulate ant colony optimization algorithm with  Hungarian method for Assignment   problem. The ant colony optimization algorithm simulates  the behavior of  real ant colony, to find the shortest path between many paths for solving the problem. It dependent on the path from the nest (problem of research) to food (optimal solution) by deposited pheromone on the path they take between the nest and food, so that other ants can smell it.
The experiment in this research  shows that the algorithm provides optimal solution. It  has outperforms with computation and it is an effective approach  and the algorithm performs significantly better than the classical method, to  reduce the region of the space considered and computation as compared to the classical methods.
 

Comparison of Edge Detection Methods in Gray Images

Sobhi H. Hamdoun; Afzal A. Hassan

AL-Rafidain Journal of Computer Sciences and Mathematics, 2006, Volume 3, Issue 2, Pages 11-28
DOI: 10.33899/csmj.2006.164056

The methods of edge detection play an important role in many image processing applications as edge detection is regarded as an important stage in image processing and the extraction of certain information from it.
Therefore, this subject was the focus of many studies performed by many authors. Many new techniques of edge detection which search into the discontinuity in color intensity of the image leading to the features of the image components were suggested.
Despite of the presence of many methods of edge detection which proved their efficiency in certain fields and gave good results on application, the performance of one method differs from one application to another, thus there was a need to carry out an evaluation of performance for each method to show its efficiency. The aim of this research is to evaluate the performance of edge detection by choosing five methods known as (Canny, Laplacian of Gaussian,Prewitt, Scobel, Roberts) and the application of each method on images with grayscale to find out the performance of each of them and writing down computer programs for each. Also, a subjective evaluation to compare the performance of these five methods using Partt Figure of Merit, calculating the increase percent in the detected edges, decrease percent in the edge points and the correct position of the edge in each method.
 

Encryption Binary Images by Using Template Matching

Sundus Khaleel Ebraheem

AL-Rafidain Journal of Computer Sciences and Mathematics, 2006, Volume 3, Issue 2, Pages 43-69
DOI: 10.33899/csmj.2006.164058

Text encryption is a very important field in application of data transformation through the digital networks, and the Internet, so it is very necessary to do encryption operation on the text data to get more security in data transformation.
In this paper, we present a method -Template Matching- to encrypt data which is represented in form of image with BMP extension by using Mono Digital Images method with partial compression for the data by using RLE method which increases the security of the method and reduces the file size.
The application results is efficient for the printed or handwritten text in Arabic or English or any other language, and for the maps or sketches images. The method gives a good ability for data encryption. It is suitable for data transformation through the Internet networks.
 

Efficiency of Artificial Neural Networks (Percepton Network) in the Diagnosis of Thyroid Diseases

Suher A. Dawood; Laheeb M. Ibrahim; Nabil D. Kharofa

AL-Rafidain Journal of Computer Sciences and Mathematics, 2006, Volume 3, Issue 1, Pages 11-22
DOI: 10.33899/csmj.2006.164042

Thyroid gland software which was obtained through research is considered an effective system to diagnosed thyroid gland automatically. This is done by a built  complementary database which is flexible and easy at work with data patients concerning those patients under observation at Hazim Al-Hafith Hospital for Oncology & Nuclear  Medicine in Mosul. The activity of Thyroid gland software was tested on information about 200 Patients, and information about them was stred in Thyroid database, after that we diagnosed The Thyroid Gland Disease by using an artificial neural network (Perceptron) that is able to recognize Thyroid Gland Disease in good recognized ratio and with a ratio close to the doctor diagnosis depending on (sign & symptoms) which may enables the doctors in depending on it the right diagnosis for the disease.                                                                 
 

FID Fast Image Display for (.BMP & .PCX) Images

Rawaa P. Qasha; Ahmed S. Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2004, Volume 1, Issue 1, Pages 66-87
DOI: 10.33899/csmj.2004.164098

Video display speed constitutes a very important factor in modern software performance. The best way to achieve fastest display is by accessing Video RAM and programming video card directly. In addition to the speed, this method provides flexibility and high performance video display operations. Besides that, dealing with 64K and 16.7 M color mode can be achieved only by this method.
Fast Image Display (FID) software is developed to display two popular types of images (BMP, PCX) using direct access to VRAM method with various SVGA modes differing in resolutions and number of colors. Assembly instructions and C++ language have been used to write Software parts.
 

Fast Backpropagation Neural Network for VQ-Image Compression

Basil S. Mahmood; Omaima N. AL-Allaf

AL-Rafidain Journal of Computer Sciences and Mathematics, 2004, Volume 1, Issue 1, Pages 96-118
DOI: 10.33899/csmj.2004.164100

The problem inherent to any digital image is the large amount of bandwidth required for transmission or storage. This has driven the research area of image compression to develop algorithms that compress images to lower data rates with better quality.  Artificial neural networks are becoming very attractive in image processing where high computational performance and parallel architectures are required.
In this work, a three layered backpropagation neural network (BPNN) is designed to compress images using vector quantization technique (VQ).The results coming out from the hidden layer represent the codebook used in vector quantization, therefore this is a new method to generate VQ-codebook. Fast algorithm for backpropagation called

(FBP) is built and tested on the designed BPNN. Results show that for the same compression ratio and signal to noise ratio as compared with the ordinary backpropagation algorithm, FBP can speed up the neural system by more than 50. This system is used for both compression/decompression  of any image. The fast backpropagation (FBP) neural network algorithm was used for  training  the designed BPNN. The efficiency of the designed BPNN comes from reducing the chance of error occurring during the compressed image transmission through analog channel (BPNN can be used for enhancing any noisy compressed image that had already been corrupted during transmission through analog channel). The simulation of the BPNN image compression system is  performed using the Borland C++ Ver 3.5 programming language. The compression system has been applied on the well known images such as Lena, Carena, and Car images, and also deals with BMP graphic format images.

A Modified Heuristic Procedure for NP-Complete Problems Supported by Genetic Algorithms

Najla Akram Al-Saati

AL-Rafidain Journal of Computer Sciences and Mathematics, 2004, Volume 1, Issue 1, Pages 120-137
DOI: 10.33899/csmj.2004.164101

This work is based on the process of modifying an intelligent heuristic rule used in solving NP-Complete problems, where a study and a modification of a Flow Shop assignment heuristic has been carried out to solve a well-known classic Artificial Intelligent problem, which is the traveling Salesman problem. For this modification to be carried out successfully, the problem’s mathematical formulation had to be studied carefully and the possibility of reformulating the problem to be more suitable for the heuristic procedure. This may require some changes in the heuristic procedure itself, these adjustments were due to the noticeable differences like the symmetric property present in the traveling salesman problem environment and some other differences.
Genetic Algorithm is added to improve the results obtained by the used heuristic, where the use of crossover and mutation procedures will provide better chances for the near optimal solution to be improved towards optimal solutions.
The test problem is made on cities that lie on the regular square grid, which simplify the calculations of distance traveled between any two cities. Programs were written using C programming language, and timers were used to measure the elapsed time of calculations in order to assess the efficiency of the program.