Journal of Al-Qadisiyah for computer science and mathematics https://qu.edu.iq/journalcm/index.php/journalcm <h3><strong>Journal of&nbsp; Al-Qadisiyah &nbsp;for computer science and mathematics (JQCM) is scientific journal issued by College of computer Science and Information Technology /University of &nbsp;Al-Qadisiyah&nbsp; since 2009&nbsp;&nbsp;periodically 2 times per year and 4 times per year since 2019, number of issues published sincece journal launched is 15 issues.The date of submission and acceptance of the article has been installed on articles published in Vol( 5)&nbsp; upwards, and the date of&nbsp;</strong><strong>available online&nbsp;</strong><strong>of the&nbsp;article has been installed on articles published in&nbsp;Voll(10)&nbsp;upwards.</strong></h3> <h3><strong><span lang="EN-US">ISSN 2521-3504 (Online), ISSN 2074-0204 (Print)</span></strong></h3> University of Al-Qadisiyah, Iraq en-US Journal of Al-Qadisiyah for computer science and mathematics 2074-0204 A Review of Image Segmentation Methods in Brain Tumor https://qu.edu.iq/journalcm/index.php/journalcm/article/view/981 <p>Accurate segmentation of the medical image of the brain is significant stage in the identification of a brain tumor during the preparation of radiotherapy. In general, medical images are utilized as radiographic techniques in diagnosis, clinical studies, and&nbsp; therapy planning, Segmentation is one of the most widely used methods to correctly classify the pixels in an image , This review sheet discusses a comprehensive literature review of modern methods of brain tumor segmentation, and outlines the extent and robustness of each currently existing method for brain tumor clinical image segmentation.</p> Marwa Adel Mutlaq Hayder Saad Abdulbaqia ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 1 9 10.29304/jqcm.2022.14.3.981 Self- Driving With Deep Reinforcement ( Survey ) https://qu.edu.iq/journalcm/index.php/journalcm/article/view/982 <p>We will focus concentrating on the scientific and technological challenges that the development of autonomous vehicles brings to a number of different manufacturers and research organizations (AVs). It is anticipated that automobiles operated by humans will continue to be a common sight on the roads for the foreseeable future; &nbsp;nevertheless, it is possible that autonomous vehicles may coexist in the same traffic environments. In order to keep traffic moving smoothly throughout the various sorts of mixed-use zones, autonomous vehicles (AVs) need to have driving rules and negotiation abilities that are analogous to those used by humans. In order to develop driving abilities that are comparable to those of humans, model-free deep reinforcement learning is used to simulate the actions of a skilled human driver. In this simulation, the difficulty of avoiding static obstacles on a two-lane roadway is investigated .</p> Hayder Salah Abdalameer Ali Abid Al-Shammary ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 10 21 10.29304/jqcm.2022.14.3.982 Interactive Situated Autonomic Multi-Agents System-Comprehensive Survey https://qu.edu.iq/journalcm/index.php/journalcm/article/view/983 <p>Multi-Agent Systems (MAS) are made up of autonomous entities called agents. Agents collaborate to complete tasks, but their intrinsic capacity to learn and make independent judgments allows them to be more flexible. Agents learn new contexts and behaviors through their interactions with other agents as well as the environment. Agents then exploit their knowledge to determine and carry out an action on the environment in order to accomplish their assigned objective. Because of its versatility, MAS is well suited to solving issues in a wide range of areas, including computer science, civil engineering, electrical engineering, etc. Developing cooperative MAS necessitates tackling a variety of issues, especially coordination among agents. Consequently, this paper discusses several interaction ways among agents in many disciplines.&nbsp; Index Terms—multi-agent system(MAS), Robotic Process Automation, situated agents, interaction.</p> Mohammed Ali Ali Obied ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 22 32 10.29304/jqcm.2022.14.3.983 Pre Diagnosing the Stroke Using Deep Learning https://qu.edu.iq/journalcm/index.php/journalcm/article/view/984 <p>&nbsp;&nbsp; Stroke is a long-term disability that affects people all around the world. A stroke deprives the brain of oxygen and nutrients, causing brain cells to stop working or die. Radiologists classify them using Magnetic Resonance Imaging(MRI) of the brain for people with stroke. We've presented a solution based on Deep Learning Algorithms such as Convolution Neural Networks (CNN) and Transfer Learning (TL). We divided MRI into two categories in this work (stroke and normal). In this paper, a 4-layer CNN is used from beginning to end with a modification of the EfficientNetB0 network by adding two layers to make the extracted features more diverse. &nbsp;CNN and pre-trained EfficientNetB0 were used to train our architecture. The EfficientNetB0 achieves an accuracy of 99.6%, while CNN achieves an accuracy of 99.2%. The newly created EfficientNetB0 could be a highly important decision-making tool in stroke research and brain diagnostic testing. As a physician's assistant, the proposed method works.</p> Makarem S. Atshan Zainab N. Nemer ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 33 43 10.29304/jqcm.2022.14.3.984 Dom Tree as the base for webpage content extraction: Review https://qu.edu.iq/journalcm/index.php/journalcm/article/view/985 <p>Because of the fast advancement of internet technology in the last twenty years, which leads to a huge number of web pages that contain a massive amount of information in every domain, the volume of available information has been steadily expanding every minute, so the analyzing and extracting information from web pages is becoming increasingly crucial, add to that information in webpages in an unstructured or semi-structured format need to transform in a structured format. &nbsp;</p> <p>Since it is hard to collect the information manually, scientists have devised a variety of methods to help extract information from different domains in an automatic way. the main information in web pages is mixed with a significant amount of unrelated information (noise) like advertisements, boxes with links to relevant material, boxes with photos or other media, top and/or side navigation bars, animated commercials, etc., effect on the performance of information extraction and web content analysis technologies. to eliminate the noise by using the Document Object Model (DOM) that can easily reach every tag in the structure of the webpages to extract the information or delete the noise.</p> <p>This article explores in-depth DOM tree-based approaches, such as HTML tags and the DOM tree, by reviewing works from 2011 to 2021 and comparing numerous elements comprehensively, including classifier methods, contribution, limitation, and evaluation metrics.</p> Hind Sabah Rahim Aliea Salman sabir Nahla Abbas Flayh ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 44 50 10.29304/jqcm.2022.14.3.985 Survey: Crime Prediction using Machine Learning Approach https://qu.edu.iq/journalcm/index.php/journalcm/article/view/986 <p>The presented studies have proven that machine learning algorithms The field of machine learning (ML) is expanding as more people realize how important it can be in a variety of crucial applications, including data mining, natural language processing, picture recognition, and expert systems. As it is well known that ML offers possible answers in all these domains and more, it is destined to be one of the pillars of our future civilization. This article presents an outline of the function of machine learning in prediction. algorithms have excelled in solving prediction and classification problems. Below We highlight the machine learning algorithms and techniques used in predicting crimes in particular, and the accuracy of the results obtained by each study or research. We see the challenges faced by a study or researcher who used machine learning algorithms and we hope with this paper, providing the researcher, in particular, with information covering the most important studies or research presented during the past five years to abbreviate the time of the researcher, and in the interest of his effort.</p> Esraa Faisal Khalaf Ali Hasan Taresh ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 51 57 10.29304/jqcm.2022.14.3.986 Touchless Hand Sanitizer Mobile Robot Application: Survey and Dataset Preparation for Deep Learning Recognition https://qu.edu.iq/journalcm/index.php/journalcm/article/view/987 <p>The COVID-19 pandemic spreads throughout the world, many sanitizer dispenser devices included robots designed to minimize human contact and as less as possible to minimize the speared of this pandemic or any germs among humans. In many positions, these sanitizers dispensers are important to sterilize and help people from infection such as patients and medical staff in hospitals, teachers, and students in schools or universities, etc. In this paper, many studies of sanitizer dispenser devices including mobile robot applications for touchless hand sanitizers especially in the coronavirus pandemic have been explained. The major aim of this survey is to compare and contrast many previous survey methodologies. This study covered the introduction to robot applications, hand sanitizers dispenser device including a mobile robot, and object detection-based deep learning techniques that recognizes people. Object detection with the deep learning method is discussed because it is the most important feature of the hand sanitizer device, which is based on a mobile robot application. Furthermore, in this work, the proposed block diagram of dataset processing has been instigated using the mini-computer Raspberry Pi version 4, Raspberry Pi camera system, and LabelImg graphical tool. These dataset outputs files of each image (label.xml and image.jpg) are prepared and classed into 7 classes to use as inputs to the next future work of deep learning. In future work, we want to create a mobile robot hand sanitizer that recognizes the people using a deep learning approach. The python programing language has been used. The contribution of this work is to create, annotate and prepare the dataset for Deep Learning while the previous related works depended on existing dataset that taken from website .</p> Rand Z. Khaleel Firas A. Raheem ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 58 65 10.29304/jqcm.2022.14.3.987 Review about applications of Remove haze from images https://qu.edu.iq/journalcm/index.php/journalcm/article/view/988 <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The problem of removing haze from images is a problem that researchers have been interested in, because of its importance in various fields in computer vision and image processing. The photos are usually taken in nature, like forests, cities, streets, etc., and are generally accepted in terrible weather conditions, especially fog. This is because the light is a critical factor in obtaining clear images, assuming the cameras' quality. The presence of various types of haze (smoke, fog, and dust) reduces the light rays that are reflected from the scenes to be photographed, so removing the haze was the researchers' primary concern. Moreover, many computerized devices use these cameras and imaging devices in various fields. Through this research, we will mention a number of those applications that use this biotechnology "dehazing."</p> Kholud A .Karoon ainab N. Nemer ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 66 75 10.29304/jqcm.2022.14.3.988 Optimize Weight sharing for Aggregation Model in Federated Learning Environment of Brain Tumor classification https://qu.edu.iq/journalcm/index.php/journalcm/article/view/989 <p>Clinical diagnosis and therapy of brain tumors are greatly aided by proper classification of the tumors.&nbsp; Brain tumors can be diagnosed more quickly and accurately if radiologists use deep learning to help the specialist and doctors examine the enormous volume of brain MRI Images. Large datasets are required in training process, and whole of such data must be centralized for be handled by such techniques. It is sometimes impossible to collect and distribute patient data on a centralized data server because of medical data privacy regulations. In this paper, federated learning (FL) is proposed, in which data is non-shareable because of patient privacy issues. Using the FL approach, we have proposed two methods of aggregation; first, which concerns ranking the weight percentage of each client, and Second average weights method. and to evaluate the suggested model, we have compared the performance of the ranking weights percentage method with the average weights of proposed CNN and pre-training (VGG-16) in the FL environment in addition to SVM and VGG-16 . The experiments result was applied on two datasets, it shows our model accuracy result is very effective when using the ranking weight percentage method as compared with other methods, it achieves accuracy (98%) on datasets (BT_large-1c) and achieve (97.14%) on the dataset (BT-large-2c).</p> Dhurgham Hassan Mahlool Mohamed Hamzah Abed ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 76 87 10.29304/jqcm.2022.14.3.989 Statistical Analysis of Aluminum Doped Titanium Dioxide https://qu.edu.iq/journalcm/index.php/journalcm/article/view/990 <p>In the present research, titanium dioxide and Al nanoparticles were purchased from a Chinese company, then the aluminum materials were added in five ratios that are (0, 1, 2, 3, 5) wt.%. The dry press method was used through a hydraulic press from one direction, using a mold of diameter 10 mm to obtain a ceramic compressed dimension that was firing at a temperature of 900 °C. The thermal conductivity is studied for all samples that include pure with the added proportions and compared between them when adding the proportions for aluminum. The ratio of 2 wt.% is the highest conductivity among the used ratios. The mechanical properties included the hardness when adding percentage from aluminum toTiO2 2 wt. % ratio showed is the highest hardness value between other ratios, the samples surface, taking surface pictures of the samples through an optical microscope.</p> Mohammed RASHEED Mohammed Abdelhadi Sarhan Ahmed Shawki Jaber Dikra Bouras , Mustafa Nuhad Al-Darraji Ahmed Rashid ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 1 8 10.29304/jqcm.2022.14.3.990 STRUCTUREAL DEASIGN OF SECURE E-COMMERCE WEBSITES EMPLOYING MULTI-AGENT SYSTEM https://qu.edu.iq/journalcm/index.php/journalcm/article/view/996 <table> <tbody> <tr> <td> <p>The vast growth in electronic trading and monetary transactions results to increase the&nbsp; importance of E-commerce applications rapidly. In order to accomplish the fully functioning, reliable, scalable, secure, efficient and user-friendly E-commerce applications, sufficient system analysis and design processes are important. Shopping over the internet requires offering secure payment method.</p> <p>Providing security for each individual online consumer at the same time (particularly for large websites) is a time-consuming effort that can result in a variety of issues, including response delays, customer orders being lost, and system freeze or crash, all of which impair system performance.</p> <p>This work seeks to present a new multi-agent system prototype structure that solves the challenge of security while avoiding issues that might degrade system performance. By creating integrated system taking into account the three parties the e-commerce, the e-bank and the customer, the main concentration is to create an archeticture that helps in decreasing the website traffic and supportng the&nbsp; security with effective performance. To simulate the real systems a recommendation system is created based on the customer behaviors to increase system performance in helping the customers to find their favorite products and solve problems like cold start, sparsity of user‐item matrix, scalability, and changes in user interest.</p> <p>This is done by creating a commercial environment (e-commerce and e-bank websites) and a software agent that is installed on the client's device to handle the purchase and ciphering procedures without the need for the consumer to intervene. The security process involve preprocessing phase followed by a modified lightweight AES employing chaotic tent map to generate encryption key.</p> </td> </tr> </tbody> </table> Farah Tawfiq Abdul Hussien Abdul Monem S. Rahma Hala Bahjat A bdul Wahab ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-13 2022-08-13 14 3 Page 88 111 10.29304/jqcm.2022.14.3.996 Passport Photo Compression: A Review https://qu.edu.iq/journalcm/index.php/journalcm/article/view/998 <p>The demand for electronic -passport photo ( frontal facial) images has grown rapidly. It now extends to Electronic Government (E-Gov) applications such as social benefits driver's license, e-passport, and e-visa . With the COVID 19 (coronavirus disease ), facial (formal) images are becoming more widely used and spreading quickly, and are being used to verify an individual's identity, but unfortunately that comes with insignificant details of constant background which leads to huge byte consumption that affects storage space and transmission, where the optimal solution that aims to curtail data size using compression techniques that based on exploiting image redundancy(s) efficiently.</p> Marwa B. AL-Obaidi Ghadah K. AL-Khafaji ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-15 2022-08-15 14 3 Page 112 119 10.29304/jqcm.2022.14.3.998 Modern Drowsiness Detection in Deep Learning: A review https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1023 <p>Recent statistics show that drowsiness is now more of a factor in some car accidents than alcohol. So numerous monitoring systems have been developed to reduce, and accidents eliminate these events. Drowsiness detection systems are plentiful, but it isn't clear which one is the most effective. This review paper will address the following issues: firstly, determining the extracted features, whether behavioral-based, physiological-based, or vehicle-based, which are used to detect driver drowsiness; secondly, focusing on using deep learning to detect driver drowsiness. Finally, concluding from this study that the hybrid-based features should be used Because it gives strength in determining the drowsiness of the driver.</p> Sarah Saadoon Jasim Alia Karim Abdul Hassan ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-23 2022-09-23 14 3 Page 119 129 10.29304/jqcm.2022.14.3.1023 Comparison of LSTM And SVM For Classification of Eye Movements in EOG Signals https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1024 <p>People with disabilities suffer from inability to communicate with their surroundings, so Human-Computer Interaction (HCI) technologies are used to have a means of communication for people with disabilities with their surroundings. HCI is an emerging technology in the disciplines of Artificial Intelligence and Biomedical Engineering. To power an external device, HCI technology uses several basic signals such as ECG, EMG, and EEG. Electrooculography (EOG) is a technique for measuring the potential difference between the cornea and the retina located between the front and back of the human eye, and the main application of EOG is to determine the directions of different eye movements. This study aims to assess eye movement for communication by persons with disabilities using electrocardiogram (EOG) data. In this study, the Supporting Vector Machine (SVM)&nbsp; and Long- Short term memory (LSTM)&nbsp; classification techniques was used and two types of features (statistical and time domain features) were used. Classification accuracy was 90.7% and 93.9% when using SVM with statistical domain and time domain features, respectively ,whereas&nbsp; Classification accuracy was 90.1%&nbsp; when using LSTM .</p> Aya R. Abih Mustafa J. Hayawi ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 130 143 10.29304/jqcm.2022.14.3.1024 The application of fuzzy Logic in improving the Performance of the European Foundation for Quality Management(EFQM) https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1025 <p>In today's tumultuous and competitive business environment, executives are more motivated than ever to demonstrate their teams' mettle by stellar results. The European Foundation for Quality Management (EFQM) has developed and verified the Excellence Model (EFQM) as the gold standard for measuring an organization's pursuit of excellence. An updated integrated strategy that incorporates fuzzy logic into the EFQM model is a powerful tool for boosting an organization's overall performance. This research utilizes the EFQM paradigm to suggest a novel and all-encompassing strategy for enhancing corporate performance. We looked at the specific situation of the Iraqi Oil Tanker Company to determine how doable the strategy actually is. With the use of the EFQM framework developed by the European Foundation for Quality Management, we have shown how useful this tool is for pinpointing both strengths and places for development. The RADAR Logical Method and Fuzzy-Based Strategy were utilized in this case study (EFQM). Matlab was used to apply the suggested technique for assessing the performance of the Iraqi Oil Tankers Company during a three-year period.</p> Miami Hamid Khalif Kareem Radi Hassan ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 144 154 10.29304/jqcm.2022.14.3.1025 Machine Learning-Based Effective Detection Scheme of Fake News https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1026 <p>Today, extremely large amounts of false news are consistently uploaded by malevolent people with fraudulent intentions, endangering democracy, justice, and public confidence while having highly harmful social impacts on both individuals and society. Due to the inherent uncontrollable posting processes of social media sites (such as Facebook, Twitter, and Snapchat), this is particularly pertinent to them. The need for earlier false news identification has considerably fueled efforts in academia and business to create more accurate fake news detection techniques. Unfortunately, there isn't much information available regarding how news spreads. There are benefits and drawbacks to relying on social media to follow the news. Social media platforms do make it possible for information to flow swiftly among users. However, these websites could be used to disseminate "fake news," which is low-quality content that contains errors. The widespread dissemination of false information has an extremely damaging effect on both people and society. As a result, the detection of fake news posted on numerous social media platforms has recently emerged as a highly regarded field of study. In this paper, an effective detection scheme of fake news based on the commonly utilized techniques of machine learning has been presented. This proposed scheme involves diverse phases; Dataset preprocessing phase, extracting the phase of the feature, and Naive Bayes (NB) and K-nearest Neighbor are used in the categorization step (KNN). The obtained results in this presented scheme exhibit that the utilization of the NB classification technique exceeds the K-NN classification technique with an accuracy of 94% using the same dataset.</p> Khalid Abood Kamel Jumana Waleed ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 155 163 10.29304/jqcm.2022.14.3.1026 On Negative Logarithm Semigroup https://qu.edu.iq/journalcm/index.php/journalcm/article/view/991 <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In this work, we introduce certain type of semigroup, namely (<strong>Negative Logarithm semigroup</strong>) ,in the functional analytic study of differential equations. We construct a solution of the pde as the form:</p> <p><img src="/journalcm/public/site/images/admin/Capture.JPG"></p> <p>Properties of this semigroup is studied.</p> <p>&nbsp;</p> Ahmed Abdel Amir Mohamed Methaq Hamza Geem ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 9 18 10.29304/jqcm.2022.14.3.991 Sf-covering dimension and sf-local dimension https://qu.edu.iq/journalcm/index.php/journalcm/article/view/992 <p>The aim of this paper is to introduce new types of dimension functions which are sf-covering.dimension,sf-dim X, and sf-local dimension, sf-loc dim X , by using semi feebly open (sf-open) sets, with examples and theorems. The relationships between them and other concepts will be studied like - -space, -regular space and -normal space.</p> Ghazwan Farhan Shaker Raad Aziz Hussain Al-Abdulla ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 19 32 10.29304/jqcm.2022.14.3.992 Double a-g-Transformation and Its Properties https://qu.edu.iq/journalcm/index.php/journalcm/article/view/993 <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In this paper, we introduce a new transformation , namely , <strong>a</strong><strong>-g-transformation </strong>&nbsp;and denote it as . This transformation consider as generalized to double g-transformation. We defined it as the following form :</p> <p><img src="/journalcm/public/site/images/admin/Capture1.JPG"></p> Ahmed Mahdi Abbood Methaq Hamza Geem ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 33 41 10.29304/jqcm.2022.14.3.993 On Differential and Integration of g-g-Transformation https://qu.edu.iq/journalcm/index.php/journalcm/article/view/994 <p>In this work we present an integral transform, namely g-g-transform and defined as :</p> <p><img src="/journalcm/public/site/images/admin/Capture3.JPG"></p> <p>This transformation consider generalized for g-transformation which defined as :</p> <p><img src="/journalcm/public/site/images/admin/Capture22.JPG"></p> <p>We study differential and integration of this transformation. Also we find the inverse of this transformation by using g-g-transformati of integration . we use differential of g-g-transormation for finding g-g-transformation of some function of the form&nbsp; .</p> Tiba Maytham fadhil Methaq Hamza Geem ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 42 58 10.29304/jqcm.2022.14.3.994 Almost Approximaitly Nearly Quasiprime Submodules https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1028 <p>Let &nbsp;be a commutative ring with identity and &nbsp;be an -module. This study deals the concept of almost approximaitly nearly quasiprime submodules as a new generalization of quasiprime submodules, also generalizations of (prime, nearly quasiprime, nearly prime, approximaitly quasiprime and approximaitly prime) submodules. We give same basic properties, and characterizations of this concept. Furthermore, we study the behaviour of almost approximaitly nearly quasiprime submodules under -homomorphisms. Also, we explain the relationships between almost approximaitly nearly quasiprime submodules with the above concepts.</p> Ali Sh. Ajeel Haibat K. Mohammadali ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 65 74 10.29304/jqcm.2022.14.3.1028 Principally ⨁-G-〖Rad〗_g-supplemented modules https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1029 <p>In this paper, a new concept has been presented that is a stronger than a previous concept called -G--supplemented. The basic definition is in an &nbsp;ring where an -module &nbsp;is said to be principally -G--supplemented (shortly, -PG--supplemented) if any cyclic submodule &nbsp;of &nbsp;with , there exists a direct summand &nbsp;of &nbsp;such that &nbsp;and . A set of properties and relations between previous modules and the given module has been dealt with simple examples illustrating those relations.</p> Thaar Younis Ghawi Narjis Mujtabah Kamil ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 75 79 10.29304/jqcm.2022.14.3.1029 Statistical Analysis of Copper Doped Titanium Dioxide https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1030 <p>In this research, titanium dioxide and Al nanoparticles were purchased from a Chinese company, then the copper materials were added in three ratios that are (0, 1, 2, 3, and 5) wt.%. The use of dry press method through a hydraulic press from one direction, using a mold of diameter of 10 mm to obtain a ceramic compressed dimension that was firing at a temperature of 900 °C. The thermal conductivity is studied for all samples that include pure with the copper added proportions and compared between them when adding the proportions for copper the ratio of 2 wt.% is the highest conductivity among the used ratios. For the mechanical properties, which included the hardness when adding percentage from copper toTiO2 2 wt.% ratio showed is the highest hardness value between other ratios, the samples surface, taking surface pictures of the samples through an optical microscope.</p> Mohammed RASHEED ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 80 88 10.29304/jqcm.2022.14.3.1030 Asymptotic behavior of Eigenvalues and Eigenfunctions of T.Regge Fractional Problem https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1031 <p>&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The asymptotic behavior of eigenvalues and eigenfunctions of T.Regge fractional boundary value problem has been shown, and we state and prove some theorems for many results, also some necessary definitions and results. In this paper, we look into a group of fractional boundary value problem equations involving fractional derivative fractional orders &nbsp;and &nbsp;with two boundary value conditions. We will which are important to state and prove those theorems; our primary findings are illustrated using examples.</p> Karwan Hama Faraj Jwamer Hozan Dlshad Hilmi ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 89 100 10.29304/jqcm.2022.14.3.1031 An Approach to Compute the Multi-Objective Programming Problem Under Triangular Fuzzy Numbers https://qu.edu.iq/journalcm/index.php/journalcm/article/view/1034 <p>The most important one advantages of the operation research (OR) theory is displayed of this paper for tackling multi-objective function programming problems (MOFPP).&nbsp; In this study, we present an approach for multi-objective fractional programming problems (MOFrPP) using fuzzy numbers (FN) coefficients in the objective functions (OF). The objective functions' (OF) parameters are all considered to be fuzzy triangular fuzzy numbers (FTrFN). This problem's multi-objective function (MOF) case was resolved by transforming the MOF to a linear programming problem (LnPP) that could be resolved using the simplex method (SM). The problem is being solved using algorithms. Then the value is compared with a result, which obtained by simplex method (SM). These techniques are illustrated with numerical examples (NE). This study shows the reliability of our methods and their utility to this specific set of multi-objective functions (MOF).</p> Rasha Jalal Mitlif ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-09-24 2022-09-24 14 3 Page 101 110 10.29304/jqcm.2022.14.3.1034 Statistical Analysis of Aluminum Doped Titanium Dioxide Using Solid State Method https://qu.edu.iq/journalcm/index.php/journalcm/article/view/955 <p>In the present research, titanium dioxide nanoparticles were fabricated using the solid-state technique, then all of the aluminum materials were added in three ratios that are (0, 1, 2, and 3 (wt. %). The dry press method was used through a hydraulic press from one direction, using a mold of diameter (10 mm) to obtain a ceramic compressed dimension that was firing at a temperature of 900 °C. The thermal conductivity is studied for all samples that include pure with the added proportions and compared between them when adding the proportions for aluminum. The ratio of (2% wt.) is the highest conductivity among the used ratios. The mechanical properties included the hardness when adding percentage from aluminum toTiO<sub>2</sub> (2% wt.) ratio showed is the highest hardness value between other ratios, the samples surface, taking surface pictures of the samples through an optical microscope.</p> Mohammed RASHEED Mohammed Abdelhadi Sarhan Ahmed Shawki Jaber Dikra Bouras Mustafa Nuhad Al-Darraji Ahmed Rashid ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 2022-08-12 2022-08-12 14 3 Page 1 8 10.29304/jqcm.2022.14.3.955