Journal of Al-Qadisiyah for computer science and mathematics
http://qu.edu.iq/journalcm/index.php/journalcm
<h3><strong>Journal of Al-Qadisiyah for computer science and mathematics (JQCM) is scientific journal issued by College of computer Science and Information Technology /University of Al-Qadisiyah since 2009 periodically 2 times per year and 4 times per year since 2019, number of issues published sincece journal launched is 15 issues.The date of submission and acceptance of the article has been installed on articles published in Vol( 5) upwards, and the date of </strong><strong>available online </strong><strong>of the article has been installed on articles published in Voll(10) upwards.</strong></h3> <h3><strong><span lang="EN-US">ISSN 2521-3504 (Online), ISSN 2074-0204 (Print)</span></strong></h3>University of Al-Qadisiyahen-USJournal of Al-Qadisiyah for computer science and mathematics2074-0204Weakly Nearly Semiprime Submodules and Some Related Concepts
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/686
<p><strong> </strong><strong>In present paper the concept of WN-semiprime submodule of unitary left R-module </strong> <strong> over a commutative ring </strong> <strong> with identity are introduced and studied, as a generalization of weakly semiprime submodules. Numerous basic properties of this concept are investigate. Where a proper submodule A of an R-module </strong> <strong> is said to be WN-semiprime, if whenever </strong> <strong>, for </strong> <strong>, implies that </strong> <strong>. Furthermore many characterizations of WN-semiprime submodule are introduced. Moreover, some properties of WN-semiprime submodules in some classes of modules are given.</strong></p>Haibat Karim MohammadaliAli Sabah Sadiq
##submission.copyrightStatement##
2020-05-052020-05-05122Page 1 – 10Page 1 – 1010.29304/jqcm.2020.12.2.686On Mixed Fuzzy Topological Ring
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/688
<p>The theory of fuzzy topological ring has wide scope of applicability than order topological ring theory. The reason is fuzzy can provide better result. Therefore, fuzzy topological ring has been found in Robotics, computer, artificial intelligent, etc. In this paper, we induce mixed fuzzy topological ring space and fuzzy neighborhoods system of mixed fuzzy topological ring space. Also, we study fuzzy continuity of mixed fuzzy topological ring.</p>Basim Mohammed MelgatMunir Abdul Khalik AL-Khafaji
##submission.copyrightStatement##
2020-05-142020-05-14122Page 11 – 18Page 11 – 1810.29304/jqcm.2020.12.2.688Influences of Heat Transfer in Peristaltic Transport of Two-Layer Model
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/689
<p> The two-layered peristaltic Transport and the heat transfer in the symmetric channel is analyzed. The core layer fluid satisfies the power-law fluid characterize and the peripheral layer is depicted as the Bingham flow model. The no-slip conditions at the walls are taken into consideration. For both zones, small Reynolds number and the long-wavelength approximations are used to simplify the governing equations. By using suitable methods, the interface equation between the two layers, the velocity, pressure gradient, temperature profile, and trapping phenomenon are studied. The influence of the physical parameters of the problem are debated and clarified graphically.</p>Rabiha S. KareemAhmed M. Abdulhadi
##submission.copyrightStatement##
2020-05-142020-05-14122Page 19 – 29Page 19 – 29Weakly Approximately –Prime Submodules And Related concepts
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/690
<p>Let R be a commutative ring with identity and P a unital left R-module . The purpose of this paper is to introduce and study the concept of WAPP-prime submodules as a generalization of weakly prime submodules , where a proper submodule L of an R-module P is called a WAPP-prime , if whenever 0≠re ϵ L for rϵR , eϵP , implies that either e or r[:<sub>R</sub> P] . Several examples , characterizations and basic properties of this concept are given .Moreover many characterizations of WAPP-prime submodules in class of multiplication modules are introduced</p>Haibat Karim MohammadaliShahad Jasim Mahmood
##submission.copyrightStatement##
2020-05-152020-05-15122Page 30– 42Page 30– 42Some Properties of Algebra Fuzzy Metric Space
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/695
<p>Our goal in the present paper is to introduce new type of fuzzy metric space called algebra fuzzy metric space after that some examples is introduced to illustrate this notion. Then basic properties of algebra fuzzy metric space is proved.</p>Jehad Rmadhan Kider
##submission.copyrightStatement##
2020-07-102020-07-10122Page 43– 56Page 43– 5610.29304/jqcm.2020.12.2.695The Principle IndecomposableProjective Characters of The Symmetric Groups S_22Modulo p=19
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/696
<p>In this paper we invention all the principle indecomposablespin(projective) characters of the symmetric group when and the characteristic of the field is 19. The principle indecomposable spincharacters of the symmetric group ,also can get it by determine all irreducible spin characters for , and all irreducible modular spin characters for , the sum of multiplication of these characters it represents the principle indecomposable spin(projective) characters of the symmetric group .For their more can get on the irreducible spin characters for by fixing all bar partitions for , also we can get on all the irreducible modular spin characters for by -inducing method, finally induce the principal indecomposable characters(P.i.s)from (see creek*) give usprincipal indecomposable characters (P.i.s) or principal characters (P.s) of .</p>Jenan AbdAlreda AbdAlreda ResenShereen Jamel AbbasHaneen J. Sadiqc
##submission.copyrightStatement##
2020-07-102020-07-10122Page 57 – 62Page 57 – 6210.29304/jqcm.2020.12.2.696Investigating the Applicability of Logistic Regression and Artificial Neural Networks in Predicting Breast Cancer
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/697
<p>Breast cancer has become recently the most common cancer and a major cause of death among women all over the world and especially in developing countries like Iraq. This study aims to predict the type of breast tumor whether benign or malignant through the different models that were built using logistic regression and neural networks which is expected to be helpful for oncologists in diagnosing the type of breast tumor. Four models were set using binary logistic regression and two different types of artificial neural networks namely multilayer perceptron (MLP) and radial basis function (RBF). Both validated and trained models were evaluated using different performance metrics like accuracy or correct classification rate (CCR), receiver operating characteristic (ROC) curves, area under ROC curve (AUC), sensitivity and specificity. Dataset has been downloaded from the machine learning repository of University of California, Irvin (UCI ml repository) that consists of 9 attributes and 699 valid instances. </p> <p> Firstly, some preprocessing was done to cleanse the data, then the models were built using the Logistic Regression method and Artificial Neural Networks and a comparison was done to find out which model will give the highest performance. Each model was validated with a different dataset than that used for developing the models. The analysis of the results showed that the Radial Basis Function neural network model is the best classifier in the prediction of the type of breast tumors since it had recorded the highest performance in terms of correct classification rate (accuracy), sensitivity, specificity, and AUC among all other models.</p>Yousra Abdulaziz MohammedEman Gadban Saleh
##submission.copyrightStatement##
2020-07-102020-07-10122Page 63– 73Page 63– 7310.29304/jqcm.2020.12.2.697On D_b-metric and general partial b-metric spaces
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/698
<p>In this paper, we introduce a new type of generalize metric space, which we call -metric space as a generalization of both -metric and b-metric spaces. Then we prove some fixed point theorem in this space. Also we define a general partial b-metric space as a generalize of a partial b-metric space and study their properties. Finally, find relation between partial b-metric, -metric and general partial b-metric spaces.</p>Norhan I. AbdullahLaith K. Shaakir
##submission.copyrightStatement##
2020-07-102020-07-10122Page 74– 86Page 74– 8610.29304/jqcm.2020.12.2.698Weak Pseudo Quasi-2- Absorbing Submodules And Related concepts
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/699
<p>In this paper R stand for commutative ring with identity ,and E is a unitary left R-module. The concept of weakly quasi-2-Absorbing submodule has been generalized in this research to a Wpq-2-Absorbing submodules ,where a paper submodule H of an R-module E is a Wpq-2-Absorbiming if 0≠abcyϵH ,for a,b,cϵR, yϵE , implies that either abyϵH+Soc(E) or acyϵH+Soc(E) or bcyϵH+Soc(E) .Several characterizations ,examples and basic properties of this concept are introduced .Moreover characterizations of Wpq-2-Absorbing submodules in some types of modules are given .Keywords: Weakly quasi-2-Absorbing submodules, Wpq-2-Absorbing submodules, socel of modules ,multiplication modules ,Z-regular modules ,non-singular modules.</p>Haibat Karim MohammadaliSada Emad Radeef
##submission.copyrightStatement##
2020-07-102020-07-10122Page 87– 96Page 87– 9610.29304/jqcm.2020.12.2.699Steganography Technique for Embedding a Variety of Binary Images inside a Grayscale Image
http://qu.edu.iq/journalcm/index.php/journalcm/article/view/694
<p>Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding a variety of related binary images in a single grayscale image rather than traditional methods of embedding information which is embedded one image in another image (cover image). First three images represent the secret images which are used for hiding from unauthorized users while other images used for making more difficult and more secret watermark. In this paper, we have merged both methods of hiding and watermark. Instead of either creating a watermark or hiding secret data in a grayscale image, we can use both of them at the same image to take advantage of both the hiding and watermark properties at the same time. The findings of the research were the results as a new watermark composed of multiple related binary images and hidden secret multiple binary images inside.</p>Huda Dheyauldeen Najeeb
##submission.copyrightStatement##
2020-07-102020-07-10122Page 1 – 11Page 1 – 1110.29304/jqcm.2020.12.2.694