وحدة المجلة

كلية علوم الحاسوب وتكنولوجيا المعلومات –  وحدة المجلة

E-mail : Journalcm@qu.edu.iq

Web Site : https://qu.edu.iq/journalcm/index.php/journalcm

البحوث المنشورة في مجلة القادسية لعلوم الحاسوب والرياضيات

Mohammed, B. (2021). Mean-Discrete Algorithm for Individuality Representation. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 1 -10. https://doi.org/10.29304/jqcm.2021.13.1.748

Jarah, N. (2021). Deep Learning In Wireless Sensor Network. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 11 -17. https://doi.org/10.29304/jqcm.2021.13.1.755

Abdulelah, A., Abed Hamed, S., RASHEED, M., SHIHAB, S., RASHID, T., & Kamil Alkhazraji, M. (2021). The Application of Color Image Compression Based on Discrete Wavelet Transform. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 18 -25. https://doi.org/10.29304/jqcm.2021.13.1.762

Turky, S., Ahmed AL-Jumaili, A., & Hasoun, R. (2021). Deep Learning Based On Different Methods For Text Summary: A Survey. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 26-35. https://doi.org/10.29304/jqcm.2021.13.1.766

Hussain, F., & Aljuboori, A. (2021). Survey on Crime Analysis Using Data Mining Based on Mobile Platforms. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 36 -44. https://doi.org/10.29304/jqcm.2021.13.1.770

Ali, A., RASHEED, M., SHIHAB, S., RASHID, T., & Abed Hamed, S. (2021). A Novel Blurring and Sharpening Techniques Using Different Images Based on Heat Equations. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 45 -57. https://doi.org/10.29304/jqcm.2021.13.1.771

Gani, M., tayyeh, D., & Hamid, D. R. (2021). Optimum Allocation of Graduation Projects: Survey and Proposed Solution. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 58 -66. https://doi.org/10.29304/jqcm.2021.13.1.774

Hussein, M., & Stephan, J. (2021). A Review Of Skin Cancer Detection. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 67 -76. https://doi.org/10.29304/jqcm.2021.13.1.775

Ali, A., RASHEED, M., SHIHAB, S., RASHID, T., & Abed Hamed, S. (2021). A Modified Heat Diffusion Based Method for Enhancing Physical Images. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 77 -87. https://doi.org/10.29304/jqcm.2021.13.1.777

Ali, A., RASHEED, M., SHIHAB, S., RASHID, T., Sabri, A., & Abed Hamed, S. (2021). An Effective Color Image Detecting Method for Colorful and Physical Images. Journal of Al-Qadisiyah for Computer Science and Mathematics13(1), Comp Page 88 -98. https://doi.org/10.29304/jqcm.2021.13.1.778

jabber, A., & Obied, P. D. A. (2021). Intelligent Software Agent in E-Health System: – Review. Journal of Al-Qadisiyah for Computer Science and Mathematics, 13(1), Comp Page 99 -108. https://doi.org/10.29304/jqcm.2021.13.1.779

Mahdi, W., & Maolood, A. (2020). Banking Intrusion Detection Systems based on customers behavior using Machine Learning algorithms: Comprehensive study. Journal of Al-Qadisiyah for Computer Science and Mathematics12(4), Comp Page 1 -11. https://doi.org/10.29304/jqcm.2020.12.4.711

Tahir Al-azawi, F., & Abdulrahman, A. (2020). Face Detection By some Methods based on MATLAB. Journal of Al-Qadisiyah for Computer Science and Mathematics12(4), Comp Page 12 -17. https://doi.org/10.29304/jqcm.2020.12.4.712

Toman, S. (2020). Review of Web Service Technologies: REST over SOAP. Journal of Al-Qadisiyah for Computer Science and Mathematics12(4), Comp Page 18 -30. https://doi.org/10.29304/jqcm.2020.12.4.715

Khudhair, A., & Abd Ali Afraji, D. (2020). Optimization of Pyrene Biodegradation Rate by Response Surface methodology. Journal of Al-Qadisiyah for Computer Science and Mathematics12(4), Comp Page 31-37. https://doi.org/10.29304/jqcm.2020.12.4.717

Mazher, A., Waleed, J., & MaoLood, A. (2020). The Security Threats and Solutions of Network Functions Virtualization: A Review. Journal of Al-Qadisiyah for Computer Science and Mathematics12(4), Comp Page 38-50. https://doi.org/10.29304/jqcm.2020.12.4.720

Alsaedi, R. (2021). The Rational Selection of the Modules of the Values for the Processors in the System of the Residual Classes. Journal of Al-Qadisiyah for Computer Science and Mathematics12(4), Comp Page 51 -60. https://doi.org/10.29304/jqcm.2020.12.4.730

Alsaedi, R. (2021). The Numerical Implementation of the Image Filtering Method with Computations in the Residue Number System. Journal of Al-Qadisiyah for Computer Science and Mathematics12(4), Comp Page 61 -71. https://doi.org/10.29304/jqcm.2020.12.4.731

Hadi, A., & Shareef, D. W. (2020). In-Situ Event Localization for Pipeline Monitoring System Based Wireless Sensor Network Using K-Nearest Neighbors and Support Vector Machine. Journal of Al-Qadisiyah for Computer Science and Mathematics12(3), Comp Page 1 -15. https://doi.org/10.29304/jqcm.2020.12.3.705

Farhan, R., Maolood, A., & Hassan, N. (2020). Optimized Deep Learning with Binary PSO for Intrusion Detection on CSE-CIC-IDS2018 Dataset. Journal of Al-Qadisiyah for Computer Science and Mathematics12(3), Comp Page 16-27. https://doi.org/10.29304/jqcm.2020.12.3.706

Abbas, A., Rahma, A. M., & Hassan, N. (2020). Comparative study on encrypted database techniques. Journal of Al-Qadisiyah for Computer Science and Mathematics12(3), Comp Page 28-34. https://doi.org/10.29304/jqcm.2020.12.3.710

Najeeb, H. (2020). Steganography Technique for Embedding a Variety of Binary Images inside a Grayscale Image. Journal of Al-Qadisiyah for Computer Science and Mathematics12(2), Comp Page 1 -11. https://doi.org/10.29304/jqcm.2020.12.2.694

Selman, H., & Ali, A. (2020). Quick Response Code for Controlling Web of Things. Journal of Al-Qadisiyah for Computer Science and Mathematics12(1), Comp Page 1 -9. https://doi.org/10.29304/jqcm.2020.12.1.657

Shati, N., Ibrahim, N., & Hasan, T. (2020). A Review of Image Retrieval Based on Ontology model. Journal of Al-Qadisiyah for Computer Science and Mathematics12(1), Comp Page 10 -14. https://doi.org/10.29304/jqcm.2020.12.1.658

Alawsi, W., Oleiwi, Z., Alwan, A., Fadhil, M., Hadi, H., & Hadi, N. (2020). Performance Analysis of Noise Removal Techniques For Digital Images. Journal of Al-Qadisiyah for Computer Science and Mathematics12(1), Comp Page 15 -25. https://doi.org/10.29304/jqcm.2020.12.1.659

Hadi, A. M., & Abdulrahman, A. A. (2020). Multi Discrete Laguerre Wavelets Transforms with The Mathematical aspects. Journal of Al-Qadisiyah for Computer Science and Mathematics12(1), Comp Page 26-37. https://doi.org/10.29304/jqcm.2020.12.1.672

AL-Bundi, S. S., & Abd, M. S. (2020). A Review on Fractal Image Compression Using Optimization Techniques. Journal of Al-Qadisiyah for Computer Science and Mathematics12(1), Comp Page 38-48. https://doi.org/10.29304/jqcm.2020.12.1.674

Hadeed, I. S., & Salman, S. A. (2020). An algorithm for a modified computation of Dedekind sums. Journal of Al-Qadisiyah for Computer Science and Mathematics12(1), Comp Page 49-53. https://doi.org/10.29304/jqcm.2020.12.1.680

Waleed, G., Mawlood, A., & Jaber, A. M. (2019). Network Anomaly Detection Using Unsupervised Machine Learning :Comparative study. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 1-9. https://doi.org/10.29304/jqcm.2019.11.4.621

Taher, A., & Kadhim, S. (2019). Speeding up Travelling Salesman Problem Using Hybrid Algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 10 -16. https://doi.org/10.29304/jqcm.2019.11.4.622

Abdul-Hassan, A., & Hadi, I. (2019). Speaker Classification using DTW and A Proposed Fuzzy Classifier. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 17 -26. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/625

Shareef, O., & Sagheer, A. (2019). Using Role-based to Implement Certificate Authority Management for Big Data. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 27-36. https://doi.org/10.29304/jqcm.2019.11.4.626

Taher, A., & Kadhimb, S. (2019). Hybrid between Genetic Algorithm and Artificial Bee Colony for Key Generation Purpose. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 37-46. https://doi.org/10.29304/jqcm.2019.11.4.627

Jabbar, N., & Salman, A. (2019). QoE ROUTING OF VIDEO STREAMING OVER MANET BY USING NS3,VLC,LXC. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 47 -57. https://doi.org/10.29304/jqcm.2019.11.4.644

Ahmed, N., & Ahmed, S. (2020). Enhancement RC4 Algorithm Based on Logistic Maps with Multi-Parameters. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 58 -67. https://doi.org/10.29304/jqcm.2019.11.4.650

Abdul Hassan, A., Saadoon, B., & humadde, H. (2020). Prediction Future Location for Multiple account users Across Social Network. Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 68 -79. https://doi.org/10.29304/jqcm.2019.11.4.653

Arif, A., & Rahma, A. M. (2020). Automated Analysis of Comments on Press Articles in Websites (Journalist of Articles on Al-Ahram newspaper as study case). Journal of Al-Qadisiyah for Computer Science and Mathematics11(4), Comp Page 80 -91. https://doi.org/10.29304/jqcm.2019.11.4.654

Abdul Hassan, A. (2019). Proposed Arabic Information Retrieval System Using Cat Swarm Optimization. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 1 -6. https://doi.org/10.29304/jqcm.2019.11.3.600

Zeki Abd Alsammed, S. (2019). Comprehensive Expansion in Big Data: Innovation and Technology. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 7 -20. https://doi.org/10.29304/jqcm.2019.11.3.601

Mohammed, R., Ali, A., & Hassan, N. (2019). Advantages and Disadvantages of Automatic Speaker Recognition Systems. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 21 -30. https://doi.org/10.29304/jqcm.2019.11.3.603

Abdul-Hussain, R., & Awad, O. (2019). Studying The Effect of Sampling Time and Network Load on Wireless Networked Control Systems. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 31 -42 . https://doi.org/10.29304/jqcm.2019.11.3.604

Mahmoud, H., & Ahmed, H. (2019). Convolution Neural Network with Dual Tree Complex Wavelet Transform Preprocessor for Universal Image Steganalysis. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 43-58. https://doi.org/10.29304/jqcm.2019.11.3.606

Mohammed, S., & Rahma, A. M. (2019). Index seek technique for Querying Encrypted Databases. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 59-68. https://doi.org/10.29304/jqcm.2019.11.3.607

Ahmed, A., Salah, H., & Jameel, J. (2019). Multikey Image Encryption Algorithm Based on a High-Complexity Hyperchaotic System. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 69-85. https://doi.org/10.29304/jqcm.2019.11.3.608

Kadhim, H., & Araheemah, W. (2019). A Comparative Between Corner-Detectors ( Harris, Shi-Tomasi & FAST ) in Images Noisy Using Non-Local Means Filter. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 86-93. https://doi.org/10.29304/jqcm.2019.11.3.609

Azeez, A., & Hassan, R. (2019). Using space-filling curves to improve the quad tree for spatial indexing. Journal of Al-Qadisiyah for Computer Science and Mathematics11(3), Comp Page 94-104. https://doi.org/10.29304/jqcm.2019.11.3.610

N. Hasoon, J., & Hassan, R. (2019). Solving Job Scheduling Problem Using Fireworks Algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 1-8. https://doi.org/10.29304/jqcm.2019.11.2.557

E.George, L., M.Rada, H., & G.Abdul-Haleem, M. (2019). Anemia Blood Cell localization Using Modified K- Means Algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 9-21. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/558

E.George, L., M.Rada, H., & G.Abdul-Haleem, M. (2019). Anemia Blood Cell localization Using Modified K- Means Algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 9-21. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/558

Mohammed Hadi, R., H. Jafer Al-khalisy, S., & Abd Hamza3N. (2019). Prediction Model for Financial Distress Using Proposed Data Mining Approach. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 37-44. https://doi.org/10.29304/jqcm.2019.11.2.570

Rokan Naif, J., H. Abdul-majeed, G., & K. Farhan, A. (2019). Internet of Things Security using New Chaotic System and Lightweight AES. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 45-52. https://doi.org/10.29304/jqcm.2019.11.2.571

Mohsin Ahmed, H., & Hasan Mahmoud, H. (2019). Convolution Neural Networks for Blind Image Steganalysis: A Comprehensive Study. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 53-64. https://doi.org/10.29304/jqcm.2019.11.2.573

Mahmood, W., S. Rashid, M., wala Aldeen, T., & wala Aldeen, T. (2019). CHOOSING APPROPRIATE IMPUTATION METHODS FOR MISSING DATA: A DECISION ALGORITHM ON METHODS FOR MISSING DATA. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 65-73. https://doi.org/10.29304/jqcm.2019.11.2.588

saadi Abdullah, A., Ali Abed, M., & Naser Ismael, A. (2019). Traffic signs recognitionusing cuckoo search algorithm and Curvelettransform with image processing methods. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 74-81. https://doi.org/10.29304/jqcm.2019.11.2.591

Al-Shammary, D. (2019). Jaccard Coefficients based Clustering of XML Web Messages for Network Traffic Aggregation. Journal of Al-Qadisiyah for Computer Science and Mathematics11(2), comp 82-91. https://doi.org/10.29304/jqcm.2019.11.2.592

Adel Saeid, A., S. Rahma, A. M., & .j. Abdul Hossen, A. M. (2018). Cuneiform symbols recognition by support vector machine (SVM). Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 1 – 11. https://doi.org/10.29304/jqcm.2019.11.1.449

Hasan Dakheel, A. (2018). Segmentation Of Tumor Brain Based On The Colour. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 12 – 17. https://doi.org/10.29304/jqcm.2019.11.1.450

Ibrahim Naser, J., & Ali Ghadhban Alsalman, H. (2019). Monitoring software risks based on integrated AHP-ANN method. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 18 – 26. https://doi.org/10.29304/jqcm.2019.11.1.463

M. Abd Zaid, M., & Hassan, S. (2019). Lightweight RC4 Algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 27 – 32. https://doi.org/10.29304/jqcm.2019.11.1.464

Hazim Ahmed Kharofa, S. (2019). Images Analysis by Using Fuzzy Clustering. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 33 – 40. https://doi.org/10.29304/jqcm.2019.11.1.465

Shams Hussein, S., Ahmed Tawfeeq, L., & Sh Altyar, S. (2019). Predicate the Ability of Extracorporeal Shock Wave Lithotripsy (ESWL) to treat the Kidney Stones by used Combined Classifier. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 41 – 52. https://doi.org/10.29304/jqcm.2019.11.1.466

Sadiq Alkinani, F., & Salih Rahma, A. M. (2019). A Comparative Study of KMCG Segmentation Based on YCbCr, RGB, and HSV Color Spaces. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 53 – 59. https://doi.org/10.29304/jqcm.2019.11.1.468

F. Shareef, W., & F. Mossa, N. (2019). PCA Classification of vibration signals in WSN based oil pipeline monitoring system. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 60 – 71. https://doi.org/10.29304/jqcm.2019.11.1.469

S. Rahma, A. M., & Ayad Jabbar, D. (2019). Development cryptography protocol based on Magic Square and Linear Algebra System. Journal of Al-Qadisiyah for Computer Science and Mathematics11(1), Comp Page 72 – 75. https://doi.org/10.29304/jqcm.2019.11.1.470

Farhan, B. (2018). Design and Construct Intelligent Tank “Water Level Sensor”. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 1 – 8. https://doi.org/10.29304/jqcm.2018.10.3.412

Ali Matnee, Y. (2018). Estimating the state of website security as poorly regulated mechanisms based on fuzzy logic methods. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 9 – 15. https://doi.org/10.29304/jqcm.2018.10.3.413

Salman Ibrahim, D. (2018). Hybrid Approach to Detect Spam Emails using Preventive and Curing Techniques. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 16 – 24. https://doi.org/10.29304/jqcm.2018.10.3.417

H. Shaker, S., & Abd Hamza, N. (2018). Three-dimensional Face Reconstruction using 3D Morphable Model Fitting Method. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 25 – 37. https://doi.org/10.29304/jqcm.2018.10.3.418.

Kh. Alzubaidi, W., & H. Shaker, S. (2018). Methods of Secure Routing Protocol in Wireless Sensor Networks. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 38 – 55. https://doi.org/10.29304/jqcm.2018.10.3.437

Hameed Shaker, S., & Najah, H. (2018). Identification based Dental Image. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 56 – 69. https://doi.org/10.29304/jqcm.2018.10.3.438

Hameed Shaker, S., Ali, E., & Ahmed Abdullah, I. (2018). Security Systems Based On Eye Movement Tracking Methods. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 70 – 78. https://doi.org/10.29304/jqcm.2018.10.3.439

bahaa aldeen abdul wahhab, A., & kareem abdul Hassan, aliaa. (2018). Proposed aspect extraction algorithm for Arabic text reviews. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 79 – 90. https://doi.org/10.29304/jqcm.2018.10.3.440

Salih Mahdi, M., & Flaih Hassan, N. (2018). Design of keystream Generator utilizing Firefly Algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics10(3), Comp Page 91 – 99. https://doi.org/10.29304/jqcm.2018.10.3.441

Baker Sadiq Majeed, R. (2018). Complaint Monitoring System Using Android in Iraq. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 1 – 9. https://doi.org/10.29304/jqcm.2018.10.2.368

Hameed Yassir, A., Fattah Dakhil, A., & Mohammed Ali, W. (2018). Condor Cloud New Solutions. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 10 – 16. https://doi.org/10.29304/jqcm.2018.10.2.369

Luay Ahmed, A. (2018). Influence Factors of Adoption E-commerce in Iraqi SMEs. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 17 – 26. https://doi.org/10.29304/jqcm.2018.10.2.370

Hazem Azez, H. (2018). R-tree for spatial data structure. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 27 – 35. https://doi.org/10.29304/jqcm.2018.10.2.371

AbdulAmeer AbdulJabbar, I., & Ali Yakoob, Z. (2018). Hybrid techniques to improve face recognition based on features extraction methods and Haar discrete wavelet transformation. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 36 – 46. https://doi.org/10.29304/jqcm.2018.10.2.372.

Badr Jarah, N. (2018). Simulation of autonomous mobile robot using fuzzy logic. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 47 – 58. https://doi.org/10.29304/jqcm.2018.10.2.373

Salal Hasan, L. (2018). Solving Traveling Salesman Problem Using Cuckoo Search and Ant Colony Algorithms. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 59 – 64. https://doi.org/10.29304/jqcm.2018.10.2.377

Ismail Atta, O. (2018). Cloud Storage: Cloud Computing and Social Media to utilizing Selective Dissemination of Information Service. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 65 – 78. https://doi.org/10.29304/jqcm.2018.10.2.378

Abbas Mohammed, H., thamer jawad, A., & Jalil Saba Khmas, S. (2018). Adaptive feed control of operating tool in Robot machine. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 79 – 87. https://doi.org/10.29304/jqcm.2018.10.2.380.

Adil Raheem, O., & Saleh Alomari, E. (2018). An Adaptive Intrusion Detection System by using Decision Tree. Journal of Al-Qadisiyah for Computer Science and Mathematics10(2), Comp Page 88 – 96. https://doi.org/10.29304/jqcm.2018.10.2.387

Yaseen Nawaf Isawi, M. (2018). Design and Implementation of Efficient and High-Speed Multiplication Circuits Based on Vedic Algorithms. Journal of Al-Qadisiyah for Computer Science and Mathematics10(1), Comp Page 88 – 99. https://doi.org/10.29304/jqcm.2018.10.1.354

Saadoon Jasim, S. (2018). Proposed method for Analyze the QR code and Detection of Vulnerabilities. Journal of Al-Qadisiyah for Computer Science and Mathematics10(1), Comp Page 100 – 109. https://doi.org/10.29304/jqcm.2018.10.1.355

Noman Abed, H. (2017). Robust and Secured Image Steganography using LSB and Encryption with QR Code. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp 1-9. https://doi.org/10.29304/jqcm.2017.9.2.144

nadhum kadhum, A., & nadhum kadhum, A. (2017). The effect of random waypoint mobility infrastructure for wireless networks. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp 10-18. https://doi.org/10.29304/jqcm.2017.9.2.145

falah .K, R., & mohammed .H, R. (2017). Convert 2D shapes in to 3D images. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp 19-23. https://doi.org/10.29304/jqcm.2017.9.2.146

Anwer Qader, B., Hasan Jihad, K., & Najm Alddeen Taher, Y. (2017). E-Management System of Kirkuk University Based on Distributed Database. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 24 – 34. https://doi.org/10.29304/jqcm.2017.9.2.310

Al-Khafaji, G., & Fadhil, S. (2017). Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 35 – 44. https://doi.org/10.29304/jqcm.2017.9.2.311

F. Khazaal, H., I. Farhan, R., I. Farhan, B., Th. Salim ALRikabi, H., Dagiuklas, T., & Kotsopoulos, S. (2017). A Proposed Model for the Mutual Dependency Between QoE and QoS in Wireless Heterogeneous Networks. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 45 – 55. https://doi.org/10.29304/jqcm.2017.9.2.312

Hayder Abdul Ameer, N. (2017). Finger print Feature Extraction Using Hybrid Approach: QPSO and Bees Algorithms Based on 3D Logistic Map. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 56 – 68. https://doi.org/10.29304/jqcm.2017.9.2.314

Aiham Kadhim Alshakarchi, D., & Salman azeez, M. (2017). Plant layout design and assessment consideration of cellular manufacturing system via G.A. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 69 – 77. https://doi.org/10.29304/jqcm.2017.9.2.315

J.S. Al-janabi, R., J.S. Al-janabi, S., & Hussein Toman, Z. (2017). New method for Increasing watermarked image quality and security. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 78 – 85. https://doi.org/10.29304/jqcm.2017.9.2.316

Ayid Ahmad, A., & Chalak Shakir, A. (2017). Black Hole Attack in Mobile Ad Hoc Network and its Avoidance. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 86 – 96. https://doi.org/10.29304/jqcm.2017.9.2.317

Abbas, T., & .Nafea Jafaar, M. (2017). Mammogram image with Wiener filter and CLAHE. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 97 – 102. https://doi.org/10.29304/jqcm.2017.9.2.318

Shadeed Al-Mejibli, I., & Hamed Abd, D. (2017). Mushroom Diagnosis Assistance System Based on Machine Learning by Using Mobile Devices. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 103 – 113. https://doi.org/10.29304/jqcm.2017.9.2.319

Abdulkhaleq Noaman, S. (2017). Adaptive playfair cipher Crypto algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 114 – 121. https://doi.org/10.29304/jqcm.2017.9.2.320

Kadhim Hoomod, H., Al-Mejibli, I., & Issa Jabboory, A. (2017). Efficient Neighborhood Function and Learning Rate of Self-Organizing Map (SOM) for Cell Towers Traffic Clustering. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 122 – 130. https://doi.org/10.29304/jqcm.2017.9.2.321

Shaheed Al-Azzawy, D., & Adnan Diwan, S. (2017). Design of Intelligent Agent Based management security system for E-government. Journal of Al-Qadisiyah for Computer Science and Mathematics9(2), Comp Page 131 – 142. https://doi.org/10.29304/jqcm.2017.9.2.322

SAFAA YOUNUS ALSAFFAWI, Z. (2017). Image Steganography by Using Exploiting Modification Direction and Knight Tour Algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics8(1), 1-11. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/57

Khuttar, J., Shaheed Mohammad, G., & Salim Ismail, M. (2017). Estimation of Multivariate Linear Regression Parameters Using Robust Methods (Comparison Study). Journal of Al-Qadisiyah for Computer Science and Mathematics8(1), 12-21. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/58

HASSAN RADHY, Z. (2017). The Technique of Robust – Loess in Regression Analysis. Journal of Al-Qadisiyah for Computer Science and Mathematics8(1), 22-26. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/59

K. Shareef, I., & M. Sameer, H. (2017). The use of reliability in the design of experiments with practical application. Journal of Al-Qadisiyah for Computer Science and Mathematics, 7(2), 57-43. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/78

muhajer kareem, S. (2017). Comparative Study the Effect of Similarity Measures on K-Means Algorithm in Clustering Arabic Texts based on Keywords. Journal of Al-Qadisiyah for Computer Science and Mathematics7(1), 11-24. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/96

Mahdi Muosa AL-Gasas, S. (2017). Evaluation of Triple Integrals with Continuous Integrands Numerically by Using Two Methods AI(MMS) and RO(MMS) and comparison Between them. Journal of Al-Qadisiyah for Computer Science and Mathematics6(2), 10-23. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/120

Hadi Hanoon, W. (2017). (( Method to Evaluate the Double Integrals with Continuous Integrands Numerically)). Journal of Al-Qadisiyah for Computer Science and Mathematics6(1), 1-8. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/129

Abdullteef, S. (2020). Region of Interest Segmentation Algorithm for Fingerprint. Journal of Al-Qadisiyah for Computer Science and Mathematics3(2), Comp Page 1 -14. https://doi.org/10.29304/jqcm.2011.3.2.702

108..H. AL – Sharoot, M., & A. Saheb, D. (2017). Forecasting of electricity power consumption in AL – Qadisiya province by using time series models & Artificial neural networks models. Journal of Al-Qadisiyah for Computer Science and Mathematics6(1), 9-26. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/132

SH, Z. ., & S, F. (2011). VARIATIONAL FORMULATION OF NONLINEAR ORDINARY DELAY DIFFERENTIAL EQUATIONS. Journal of Al-Qadisiyah for Computer Science and Mathematics3(1), Math Page 3-14. https://doi.org/10.29304/jqcm.2011.3.1.703

Porn; Porn Pics; Porn Tube; Porn Watch; Asa Akira Porn Porno izle; Porno Resim;

small rss seocips