About
AL-Rafidain Journal of Computer Sciences and Mathematics (RJCSM) is a peer-reviewed, open-access scientific journal publishing under Creative Commons Attribution 4.0 International (CC-BY) license. This journal has been published by the College of Computer Science and Methematics, University of Mosul, Iraq, since June 2004. It's dedicated to advancing research in the fields of computer science, mathematics, and their interdisciplinary applications by providing a platform for high-quality, original research contributions from scholars and practitioners worldwide. RJCSM requires a 100 US$ fee for publishing an accepted manuscript. Any governmental or non-governmental organization does not financially support the journal.
______________________________________________________________________________________________________
AL-Rafidain Journal of Computer Sciences and Mathematics (RJCSM) is a signatory to the Sustainable Development Goals (SDG) Publishers Compact. RJCSM supports the following U.N. Sustainable Development Goals (SDG) :
SDG 1 – Quality Education
Ensure inclusive and equitable quality education and promote lifelong learning opportunities for all.
SDG 2 – Gender Equality
Achieve gender equality and empower all women and girls.
(Relevant to promoting women in STEM, digital inclusion, and tech-driven empowerment).
SDG 3 – Industry, Innovation, and Infrastructure
Build resilient infrastructure, promote inclusive and sustainable industrialization, and foster innovation.
(Core to computer science, mathematics, AI, and innovation research).
SDG 4 – Sustainable Cities and Communities
Make cities and human settlements inclusive, safe, resilient, and sustainable.
(Relevant to smart cities, IoT, sustainable urban tech solutions).
Current Issue
Vol. 19 No. 1 (2025): Volume 19 Issue 1
Volume 19 Issue 1
Published: 2025-09-13
Contents
Research Paper
Reactive Routing Protocol Is One of the Most Important Parameters In MANET, So A Study of Their Performance Is Done in the Next Sub Sections Using NS2
MOHAMMED JABER ALAWADI
Mobile ad hoc network is a creation of portable devices; they create a network with infrastructure on the fly that are ever changing. As in the previous network structure, each node performs both...
DOI: 10.33899/csmj.2024.154315.1150
Investigation a Conjuacy a Conjugacy Coefficient for Conjugate Gradient Method to Solving Unconstrained Optimization Problems
Hamsa Th. Chilmerane, Mays Basil Jarjis
In this research, a new conjugacy coefficient is derived for conjugate gradient method(C.G) and a new direction was obtained. In theory, this direction achieve sufficiently desent condition by...
DOI: 10.33899/csmj.2025.154547.1153
Generalization of the Transformation Method to the Stratonovich Formula for Solving Stochastic Differential Equations
Ali mahmood alojedi, Abdulghafoor J. Salim
In this research, the reducible method or what is called the transformation method was generalized to the Stratonovich formula used to solve stochastic differential equations (SDEs), and the...
DOI: 10.33899/csmj.2025.155177.1155
Complex dynamics of a family Cubic-Logistic map
baraa salim ahmed, Salma Muslih M. Farris
In [1] , we introduce a new family of the Logistic map, namely the cubic logistic maps L= {L_ (x)=x^2 (1-x):>0,xR}. In this work we study the complex dynamics of this family i.e. L= {L_ (z)=z^2...
DOI: 10.33899/csmj.2025.155264.1156
Reducing Execution Time of Pixel-Based Machine Learning Classification Algorithms Using Parallel Processing Concept
Aliaa Shaker Mahmoud, Mohammed Chachan Younis
Parallel processing is essential in machine learning to meet the computational requirements resulting from the complexity of algorithms and the size of the dataset, by taking advantage of the...
DOI: 10.33899/csmj.2025.156050.1159
Haemoglobin Levels Analysis Using Robust Partial Least Square Regression Models
taha Hussien ali, Mahammad Mahmoud Bazid
The Robust Partial Least Square Regression method is used to handle outliers and increase the explanation proportion, but it does not reduce the average of the mean square error. In this article,...
DOI: 10.33899/csmj.2025.156730.1163
Minimising Security Deviations in Software-Defined Networks Using Deep Learning
mohammed sami alghaloom
This study aims to enhance the security of Software-Defined Networks (SDN) byemploying deep learning techniques to detect cyber threats and mitigate attacks. A comprehensive data analysis was...
DOI: 10.33899/csmj.2025.156885.1166
AI-Driven Non-Invasive Diagnosis of Diverse Medical Conditions Through Nail Image Analysis with High-Performance Ensemble Classifier
Abeer Mohamad Alshiha, Wai Lok Woo
In this research, the application of deep learning methods for the classification of human nail diseases using image analysis is investigated. The aim was to establish a non-invasive, automatic...
DOI: 10.33899/csmj.2025.160308.1189
Improved Dai–Liao Conjugate Gradient Methods for Large-Scale Unconstrained Optimization
Basim A. Hassan, Alaa Luqman Ibrahim, abd elhamid mehamdia
This research introduces and evaluates two enhanced conjugate gradient methods for unconstrained optimization, building upon the DaiLiao conjugacy condition and further refined through the...
DOI: 10.33899/csmj.2025.159774.1186
Review Paper
Student Attendance and Evaluation System : A Review
Sura Hasan Falih, Yaseen Hikmat Ismael
In recent years, technologies have brought about significant changes in education, with digitization becoming a key feature that can enhance the quality and effectiveness of the educational...
DOI: 10.33899/csmj.2025.155461.1158
Software Defect Prediction Based On Deep Learning Algorithms : A Systematic Literature Review
Akhlas Tariq Hasan, Shayma Mustafa Mohi-Aldeen
Software bug prediction (SDP) techniques identify bugs in the early stages of the software development life cycle through a series of steps to produce reliable and high-quality software. Deep...
DOI: 10.33899/csmj.2025.156086.1160
The Strongly Tri-nil Clean Rings
Rana Mahammed Shafik, Nazar H. Shuker
This study explores the structure and properties of strongly Tri-nil clean rings. A ring is defined as strongly Tri-nil clean if every member in a ring can be expressed as the sum of a tripotent...
DOI: 10.33899/csmj.2025.156371.1164
Credit Card Fraud Detection Using Feature Select Method and Improved Machine Learning Algorithm
Mohammed mansooor AL-Hammadi
In todays digital age, credit card fraud has become a serious issue, posing financial risks to individuals, businesses, and financial institutions alike. Detecting credit card fraud is crucial to...
DOI: 10.33899/csmj.2025.157705.1175
The Performance of Different Video Segmentation or Video Shot Boundary Detection Techniques: A Survey
Rafal Ali Sameer
Video is a way to convey information on the internet which is more popular than the text. Video processing expanded with the using of videos in various fields and highly developing of communication...
DOI: 10.33899/csmj.2025.156866.1165