Volume 13, Issue 2, Autumn 2019


A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code

Nada Kasm Yahya; Zyiad Adrees Hamad Youines

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 13-25
DOI: 10.33899/csmj.2020.163511

In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1).

Build a Real-Time Home Security Alarm System Using a Kinect Sensor

Zaid A. Mundher; Khalida Basheer; Safaa Ayad Najeeb; Rami Zuhair

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 26-34
DOI: 10.33899/csmj.2020.163512

Surveillance camera systems have been widely used in homes, businesses and other places of work. These systems with its all capabilities and features provide protection to people who uses them.  In this work, a home security alarm system was designed and implemented based on the Microsoft Kinect sensor. The introduced system can detect intrusion and respond to it in real-time. If the intrusion is detected, the system sends SMS as a notification to the authorized user. Moreover, as soon as the intrusion is detected, pictures will be taken using the RGB camera of the Kinect. These pictures will be sent to the authorized user via email, and saved on the local drive. Simultaneously, the proposed system emits a loud sound to frighten away intruders. The proposed system could be used in homes, offices, warehouses, banks, hospitals, etc..
 
 

Design and Implement an Android Application to Remotely Control a Mindstorm NXT Robot

Zaid A. Mundher; Noora Ammar Salim; Baraa Abdulmunem; Raghad Muwafaq

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 35-45
DOI: 10.33899/csmj.2020.163513

Nowadays, robotics technology has become very popular in all fields of human life. Many robots have been already used in different applications such as indoor service, military undertaking, entertainment, healthcare service, etc. On the other hand, controlling robot remotely plays an important role in many areas when people cannot reach easily. Therefore, the aim of this work is to allow users to perform remote control experiments on a mobile robot through Bluetooth, Internet and SMS. The commands could be entered manually, using voice command, or using QR code. To limit the cost of the proposed system, the inexpensive (compared to more professional robot platforms) LEGO Mindstorm robot is used.
 

A New Method to Convert the DNA Sequence of Human to a QR Code

Sadoon Hussein Abdullah; Zahraa Tariq Abdulhamid

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 46-55
DOI: 10.33899/csmj.2020.163514

Data transmission, security and authenticity, nowadays is considered the major source of problems. To face these problems a suitable solution have to be forwarded . Steganography is forwarded  one of the solutions as a technique among many. This paper includes proposal for using a new technique called (Quick Respond Codes) QR Codes .
QR Codes technique is mainly used to convert and store messages since it has higher and large storage capacity, in addition to that we used, in this paper , the STR (Short Tandem Repeats) DNA sequence. STR DNA is very important because each person has its own DNA which means that security and authentication ) reliable ( are very high. The proposed  method   is to convert the hidden data (STR DNA sequence) to QR code that mean the security is at maximum. Then, by using the MD5 (Message Digest 5) Algorithm,  the result data is converted to QR code and the data within the data areas are stored in an unusually large format to make retrieval difficult.
Finally, STR DNA sequences were applied in different lengths and converted to QR code. By this method , the QR code is applied in different applications and it was very fast (3-4 second). To apply this technique and to reduce the cost, we use a webcam to get back the private (confidential) data from the QR code. The data were retrieved completely without any error because QR code is reliable and authentic. From the above result we suggest to use QR Code for indentification of  the of the individual (ID).
 

OMU: An Ontology For Mosul University

Ban Sharief Mustafa; Ibrahiem Adnan

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 56-66
DOI: 10.33899/csmj.2020.163515

Nowadays, data from different real-time data streams are coming in. The classical relational database systems cannot manage such big data. Big data should be managed in a way that keeps the semantic relations between different concepts. Ontology is a powerful tool that comes from the concept of the semantic web, can formulate data schema as semantically connected objects. Ontology can be shared and reused across different domains and sites.  In this paper, an ontology that captures the main concepts and their relationships in Mosul university is proposed. The main steps for OMU (ontology for Mosul University) development are showen using protégé ontology editor. Also, several queries are implemented to show how we can use inference engine to infer new and implicit knowledge from ontologies. visualization tools are used to visualize OMU ontology.
 

Improving Message Embedding by using some Attributes of Color Image

Ahmed Saadi Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 67-77
DOI: 10.33899/csmj.2020.163516

In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System with six cross-product nonlinearities terms, 2017], this system has three critical points employs ten terms include six quadratic cross-product nonlinearity terms,  We notice that when we apply any linear control method that relies on a single  unit control added to the system, the system behavior in this case cannot control it, so we applied enhancing linear feedback control at origin and we noticed that a necessary condition for suppression is getting positive feedback coefficient. Theoretical analysis and numerical simulation check the validity of the results obtained.
 

Studying the Bessell Equation of Complex Order

Thair Y. Thanoon; Omar Thaher shalal

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 13-27
DOI: 10.33899/csmj.2020.163517

In this paper we derive Bessel equation of complex order (n + i), after that generalized recurrence relations from Bessel equation of order (n) to Bessel equation of complex order (n + i) and will satisfy that. We given illustrates example of different cases .
 

Blind Steganalysis using One-Class Classification

Mohammed A. Karem M.; Ahmed Sami Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 28-41
DOI: 10.33899/csmj.2020.163518

Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterpart, Steganalysis, which aims to suspect and analyze the transmitted media to decide wither it contain an embedded data or not which we present in a blind Steganalysis way. One-Class Classification (OCC) machine learning algorithms aim to build classification models depending on positive class only when the negative class is not available or poorly sampled. Here in this paper we depend on a one-class support vector machines (OCSVM) which has been trained on only one class of images that is clean images class, so that the trained classifier can classify new reviews to their correct class i.e. clean or stego. Training an OCC turned to be hard work and required long execution time since classifier parameters tuning, data separation and model evaluation needed to be done manually in a brute force way. A powerful programming language (Python) with the powerful machine learning library (Scikit-Learn) gave a promising classification results in deciding whether an input image is clean or stego image.
 

Effect of Magnetic Field on Blood Flow in Stenoted Arteries

Rotaina J. Essa; Nawara J. Essa

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 42-48
DOI: 10.33899/csmj.2020.163519

In this paper, the effect of magnetic field on blood flow in stenoted arteries was studied, stokes equations in polar coordinates were used to describe such flow. All flow characteristics were found under the influence of the magnetic field and how this stenosis affects flow.
 

A Proposed Method for Feature Selection using a Binary Particle Swarm Optimization Algorithm and Mutual Information Technique

Mustafa Ayham Abed Alhafedh; Omar Saber Qasim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 49-60
DOI: 10.33899/csmj.2020.163520

Feature selection is one of the most important issues in improving the data classification process. It greatly influences the accuracy of the classification. There are many evolutionary algorithms used for this purpose, such as the Particle Swarm Optimization (PSO) in discrete space through the Binary PSO concept. The BPSO optimization algorithm derives its mechanism from the default PSO algorithm but in discrete space. In this research, a hybrid approach was proposed between the BPSO algorithm and Mutual Information (MI) to obtain subsets of features through two basic phases: the first is to use the BPSO algorithm to determine the features affecting the data classification process by relying on an objective function. In the second phase, the MI method is used to reduce the number of features identified by the BPSO method. The results of the proposed algorithm have demonstrated efficiency and effectiveness by obtaining higher classification accuracy and using fewer features than default methods.
 

On MLGP- Rings

Raida D. mahmood; Ebtehal S. Mageed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 2, Pages 61-66
DOI: 10.33899/csmj.2020.163521

An ideal K of a ring R is called right (left) generalized pure (GP -ideal) if for every a ∈ K, there exists m ∈ Z+, and b ∈ K such that  am = am b ( am = b am) . A ring R is called MLGP-ring if every right maximal ideal is left GP-ideal. In this paper have been studied some new properties of MLGP-rings and the relation between this rings and strongly π-regular rings some of the main result of the present work are as follows:
1- Let R be a local ,MLGP and  SXM ring. Then:
(a)  J (R) = 0.
(b)  If R is NJ-ring. Then r(am) is a direct sum and for all ∈ R,  m ∈ Z+.
2- Let R be a local, SXM and NJ-ring . Then R is strongly π-regular if and only if R i LGP.