Journal of Al-Qadisiyah for computer science and mathematics http://qu.edu.iq/journalcm/index.php/journalcm <h3><strong>Journal of &nbsp; Al-Qadisiyah &nbsp;for computer science and mathematics (JQCM) is scientific journal issued by College of computer Science and Information Technology /University of &nbsp;Al-Qadisiyah&nbsp; since 2009&nbsp;&nbsp;periodically 2 times per year and 4 times per year since 2019, number of issues published sincece journal launched is 15 issues.The date of submission and acceptance of the article has been installed on articles published in Vol( 5)&nbsp; upwards, and the date of&nbsp;</strong><strong>available online&nbsp;</strong><strong>of the&nbsp;article has been installed on articles published in&nbsp;Voll(10)&nbsp;upwards.</strong></h3> <h3><strong><span lang="EN-US">ISSN 2521-3504 (Online), ISSN 2074-0204 (Print)</span></strong></h3> University of Al-Qadisiyah en-US Journal of Al-Qadisiyah for computer science and mathematics 2074-0204 Weakly Nearly Semiprime Submodules and Some Related Concepts http://qu.edu.iq/journalcm/index.php/journalcm/article/view/686 <p><strong>&nbsp; </strong><strong>In present paper the concept of WN-semiprime submodule of unitary left R-module </strong> <strong>&nbsp;over a commutative ring </strong> <strong>&nbsp;with identity are introduced and studied, as a generalization of weakly semiprime submodules. Numerous basic properties of this concept are investigate. Where a proper submodule A of an R-module </strong> <strong>&nbsp;is said to be WN-semiprime, if whenever </strong> <strong>, for </strong> <strong>, implies that </strong> <strong>. Furthermore many characterizations of WN-semiprime submodule are introduced. Moreover, some properties of WN-semiprime submodules in some classes of modules are given.</strong></p> Haibat Karim Mohammadali Ali Sabah Sadiq ##submission.copyrightStatement## 2020-05-05 2020-05-05 12 2 Page 1 – 10 Page 1 – 10 10.29304/jqcm.2020.12.2.686 On Mixed Fuzzy Topological Ring http://qu.edu.iq/journalcm/index.php/journalcm/article/view/688 <p>The theory of fuzzy topological ring has wide scope of applicability than order topological ring theory. The reason is fuzzy can provide better result. Therefore, fuzzy topological ring has been found in Robotics, computer, artificial intelligent, etc. In this paper, we induce mixed fuzzy topological ring space and fuzzy neighborhoods system of mixed fuzzy topological ring space. Also, we study fuzzy continuity of mixed fuzzy topological ring.</p> Basim Mohammed Melgat Munir Abdul Khalik AL-Khafaji ##submission.copyrightStatement## 2020-05-14 2020-05-14 12 2 Page 11 – 18 Page 11 – 18 10.29304/jqcm.2020.12.2.688 Influences of Heat Transfer in Peristaltic Transport of Two-Layer Model http://qu.edu.iq/journalcm/index.php/journalcm/article/view/689 <p>&nbsp;The two-layered peristaltic Transport and the heat transfer in the symmetric channel is analyzed. The core layer fluid satisfies the power-law fluid characterize and the peripheral layer is depicted as the Bingham flow model. The no-slip conditions at the walls are taken into consideration. For both zones, small Reynolds number and the long-wavelength approximations are used to simplify the governing equations. By using suitable methods, the interface equation between the two layers, the velocity, pressure gradient, temperature profile, and trapping phenomenon are studied. The influence of the physical parameters of the problem are debated and clarified graphically.</p> Rabiha S. Kareem Ahmed M. Abdulhadi ##submission.copyrightStatement## 2020-05-14 2020-05-14 12 2 Page 19 – 29 Page 19 – 29 Weakly Approximately –Prime Submodules And Related concepts http://qu.edu.iq/journalcm/index.php/journalcm/article/view/690 <p>Let R be a commutative ring with identity and P&nbsp; a unital left R-module&nbsp; . The purpose of this paper is to introduce and study the concept of WAPP-prime submodules as a generalization of weakly prime submodules&nbsp; , where a proper submodule L of an R-module P is called a WAPP-prime , if whenever 0≠re ϵ L for rϵR , eϵP , implies that either e&nbsp;or r[:<sub>R</sub> P] . Several examples , characterizations and basic properties of this concept are given .Moreover many characterizations of WAPP-prime submodules in class of multiplication modules are introduced</p> Haibat Karim Mohammadali Shahad Jasim Mahmood ##submission.copyrightStatement## 2020-05-15 2020-05-15 12 2 Page 30– 42 Page 30– 42 Some Properties of Algebra Fuzzy Metric Space http://qu.edu.iq/journalcm/index.php/journalcm/article/view/695 <p>Our goal in the present paper is to introduce new type of fuzzy metric space called algebra fuzzy metric space after that some examples is introduced to illustrate this notion. Then basic properties of algebra fuzzy metric space is proved.</p> Jehad Rmadhan Kider ##submission.copyrightStatement## 2020-07-10 2020-07-10 12 2 Page 43– 56 Page 43– 56 10.29304/jqcm.2020.12.2.695 The Principle IndecomposableProjective Characters of The Symmetric Groups S_22Modulo p=19 http://qu.edu.iq/journalcm/index.php/journalcm/article/view/696 <p>In this paper we invention all the principle indecomposablespin(projective) characters of the symmetric group when and the&nbsp; characteristic of the field is 19. The principle indecomposable spincharacters&nbsp; of the symmetric group ,also can get it by determine all irreducible spin characters for &nbsp;, and all irreducible modular spin characters for &nbsp;, the sum of multiplication of these characters it represents the principle indecomposable spin(projective) characters&nbsp; of the symmetric group .For their more can get on the irreducible spin characters for &nbsp;by fixing all bar partitions for &nbsp;, also we can get on all the irreducible modular spin characters for &nbsp;by -inducing method, finally induce the principal indecomposable characters(P.i.s)from &nbsp;(see creek*) give usprincipal indecomposable characters (P.i.s) or principal characters (P.s) of&nbsp; .</p> Jenan AbdAlreda AbdAlreda Resen Shereen Jamel Abbas Haneen J. Sadiqc ##submission.copyrightStatement## 2020-07-10 2020-07-10 12 2 Page 57 – 62 Page 57 – 62 10.29304/jqcm.2020.12.2.696 Investigating the Applicability of Logistic Regression and Artificial Neural Networks in Predicting Breast Cancer http://qu.edu.iq/journalcm/index.php/journalcm/article/view/697 <p>Breast cancer has become recently the most common cancer and a major cause of death among women all over the world and especially in developing countries like Iraq. This study&nbsp; aims to predict the type of breast tumor whether benign or malignant through the different models that were built using logistic regression and neural networks which is expected to be helpful for oncologists in diagnosing the type of breast tumor. Four models were set using binary logistic regression&nbsp; and two different types of artificial neural networks namely multilayer perceptron (MLP) and radial basis function (RBF). Both validated and trained models were evaluated using&nbsp; different performance metrics like accuracy or correct classification rate (CCR), receiver operating characteristic (ROC) curves, area under ROC curve (AUC), sensitivity and specificity. Dataset has been downloaded from the machine learning repository of University of California, Irvin (UCI ml repository) that consists of 9 attributes&nbsp; and 699 valid instances.&nbsp;&nbsp;</p> <p>&nbsp;Firstly, some preprocessing was done to cleanse the data, then the models were built using the Logistic Regression method and Artificial Neural Networks and a comparison was done to find out which model will give the highest performance. Each model was validated with a different dataset than that used for developing the models. The analysis of the results showed that the Radial Basis Function neural network model is the best classifier in the prediction of the type of breast tumors since it had recorded the highest performance in terms of correct classification rate (accuracy), sensitivity, specificity, and AUC among all other models.</p> Yousra Abdulaziz Mohammed Eman Gadban Saleh ##submission.copyrightStatement## 2020-07-10 2020-07-10 12 2 Page 63– 73 Page 63– 73 10.29304/jqcm.2020.12.2.697 On D_b-metric and general partial b-metric spaces http://qu.edu.iq/journalcm/index.php/journalcm/article/view/698 <p>In this paper, we introduce a new type of generalize metric space, which we call -metric space as a generalization of both -metric and b-metric spaces. Then we prove some fixed point theorem in this space. Also we define a general partial b-metric space as a generalize of a partial b-metric space and study their properties. Finally, find relation between partial b-metric, -metric and general partial b-metric spaces.</p> Norhan I. Abdullah Laith K. Shaakir ##submission.copyrightStatement## 2020-07-10 2020-07-10 12 2 Page 74– 86 Page 74– 86 10.29304/jqcm.2020.12.2.698 Weak Pseudo Quasi-2- Absorbing Submodules And Related concepts http://qu.edu.iq/journalcm/index.php/journalcm/article/view/699 <p>In this paper R stand for commutative ring with identity ,and E is a unitary left R-module. The concept of weakly quasi-2-Absorbing submodule has been generalized in this research to a Wpq-2-Absorbing submodules ,where a paper submodule H of an R-module E is a Wpq-2-Absorbiming if 0≠abcyϵH ,for a,b,cϵR, yϵE , implies that either abyϵH+Soc(E) or acyϵH+Soc(E) or bcyϵH+Soc(E) .Several characterizations ,examples and basic properties of this concept are introduced .Moreover characterizations of Wpq-2-Absorbing submodules in some types of modules are given .Keywords: Weakly quasi-2-Absorbing submodules, Wpq-2-Absorbing submodules, socel of modules ,multiplication modules ,Z-regular modules ,non-singular modules.</p> Haibat Karim Mohammadali Sada Emad Radeef ##submission.copyrightStatement## 2020-07-10 2020-07-10 12 2 Page 87– 96 Page 87– 96 10.29304/jqcm.2020.12.2.699 Steganography Technique for Embedding a Variety of Binary Images inside a Grayscale Image http://qu.edu.iq/journalcm/index.php/journalcm/article/view/694 <p>Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding a variety of related binary images in a single grayscale image rather than traditional methods of embedding information which is embedded one image in another image (cover image). First three images represent the secret images which are used for hiding from unauthorized users while other images used for making more difficult and more secret watermark. In this paper, we have merged both methods of hiding and watermark. Instead of either creating a watermark or hiding secret data in a grayscale image, we can use both of them at the same image to take advantage of both the hiding and watermark properties at the same time. The findings of the research were the results as a new watermark composed of multiple related binary images and hidden secret multiple binary images inside.</p> Huda Dheyauldeen Najeeb ##submission.copyrightStatement## 2020-07-10 2020-07-10 12 2 Page 1 – 11 Page 1 – 11 10.29304/jqcm.2020.12.2.694