AL-Rafidain Journal of Computer Sciences and Mathematics (RJCSM)  is a peer-reviewed, open-access scientific journal publishing under Creative Commons Attribution 4.0 International (CC-BY) license. This journal has been published by the College of Computer Science and Methematics, University of Mosul, Iraq, since June 2004. It's dedicated to advancing research in the fields of computer science, mathematics, and their interdisciplinary applications by providing a platform for high-quality, original research contributions from scholars and practitioners worldwide. RJCSM requires a 100 US$ fee for publishing an accepted manuscript. Any governmental or non-governmental organization does not financially support the journal.

______________________________________________________________________________________________________

AL-Rafidain Journal of Computer Sciences and Mathematics (RJCSM)  is a signatory to the Sustainable Development Goals (SDG) Publishers Compact.  RJCSM supports the following U.N. Sustainable Development Goals (SDG) :

SDG 1 – Quality Education

Ensure inclusive and equitable quality education and promote lifelong learning opportunities for all.

SDG 2 – Gender Equality

Achieve gender equality and empower all women and girls.

(Relevant to promoting women in STEM, digital inclusion, and tech-driven empowerment).

SDG 3 – Industry, Innovation, and Infrastructure

Build resilient infrastructure, promote inclusive and sustainable industrialization, and foster innovation.

(Core to computer science, mathematics, AI, and innovation research).

SDG 4 – Sustainable Cities and Communities

Make cities and human settlements inclusive, safe, resilient, and sustainable.

(Relevant to smart cities, IoT, sustainable urban tech solutions).

Vol. 19 No. 1 (2025): Volume 19 Issue 1

Volume 19 Issue 1

Published: 2025-06-26

Contents


Research Paper
Reactive Routing Protocol Is One of the Most Important Parameters In MANET, So A Study of Their Performance Is Done in the Next Sub Sections Using NS2

MOHAMMED JABER ALAWADI

Mobile ad hoc network is a creation of portable devices; they create a network with infrastructure on the fly that are ever changing. As in the previous network structure, each node performs both...

DOI: 10.33899/csmj.2024.154315.1150

Pages: 18-27
Investigation a Conjuacy a Conjugacy Coefficient for Conjugate Gradient Method to Solving Unconstrained Optimization Problems

Hamsa Th. Chilmerane, Mays Basil Jarjis

In this research, a new conjugacy coefficient is derived for conjugate gradient method(C.G) and a new direction was obtained. In theory, this direction achieve sufficiently desent condition by...

DOI: 10.33899/csmj.2025.154547.1153

Pages: 28-33
Generalization of the Transformation Method to the Stratonovich Formula for Solving Stochastic Differential Equations

Ali mahmood alojedi, Abdulghafoor J. Salim

In this research, the reducible method or what is called the transformation method was generalized to the Stratonovich formula used to solve stochastic differential equations (SDEs), and the...

DOI: 10.33899/csmj.2025.155177.1155

Pages: 34-40
Complex dynamics of a family Cubic-Logistic map

baraa salim ahmed, Salma Muslih M. Farris

In [1] , we introduce a new family of the Logistic map, namely the cubic logistic maps L= {L_ (x)=x^2 (1-x):>0,xR}. In this work we study the complex dynamics of this family i.e. L= {L_ (z)=z^2...

DOI: 10.33899/csmj.2025.155264.1156

Pages: 41-47
Reducing Execution Time of Pixel-Based Machine Learning Classification Algorithms Using Parallel Processing Concept

Aliaa Shaker Mahmoud, Mohammed Chachan Younis

Parallel processing is essential in machine learning to meet the computational requirements resulting from the complexity of algorithms and the size of the dataset, by taking advantage of the...

DOI: 10.33899/csmj.2025.156050.1159

Pages: 53-66
Haemoglobin Levels Analysis Using Robust Partial Least Square Regression Models

taha Hussien ali, Mahammad Mahmoud Bazid

The Robust Partial Least Square Regression method is used to handle outliers and increase the explanation proportion, but it does not reduce the average of the mean square error. In this article,...

DOI: 10.33899/csmj.2025.156730.1163

Pages: 84-95
Minimising Security Deviations in Software-Defined Networks Using Deep Learning

mohammed sami alghaloom

This study aims to enhance the security of Software-Defined Networks (SDN) byemploying deep learning techniques to detect cyber threats and mitigate attacks. A comprehensive data analysis was...

DOI: 10.33899/csmj.2025.156885.1166

Pages: 96-104
AI-Driven Non-Invasive Diagnosis of Diverse Medical Conditions Through Nail Image Analysis with High-Performance Ensemble Classifier

Abeer Mohamad Alshiha, Wai Lok Woo

In this research, the application of deep learning methods for the classification of human nail diseases using image analysis is investigated. The aim was to establish a non-invasive, automatic...

DOI: 10.33899/csmj.2025.160308.1189

Pages: 169-177
Improved Dai–Liao Conjugate Gradient Methods for Large-Scale Unconstrained Optimization

Basim A. Hassan, Alaa Luqman Ibrahim, abd elhamid mehamdia

This research introduces and evaluates two enhanced conjugate gradient methods for unconstrained optimization, building upon the DaiLiao conjugacy condition and further refined through the...

DOI: 10.33899/csmj.2025.159774.1186

Pages: 178-186
Review Paper
Student Attendance and Evaluation System : A Review

Sura Hasan Falih, Yaseen Hikmat Ismael

In recent years, technologies have brought about significant changes in education, with digitization becoming a key feature that can enhance the quality and effectiveness of the educational...

DOI: 10.33899/csmj.2025.155461.1158

Pages: 48-52
Software Defect Prediction Based On Deep Learning Algorithms : A Systematic Literature Review

Akhlas Tariq Hasan, Shayma Mustafa Mohi-Aldeen

Software bug prediction (SDP) techniques identify bugs in the early stages of the software development life cycle through a series of steps to produce reliable and high-quality software. Deep...

DOI: 10.33899/csmj.2025.156086.1160

Pages: 67-79
The Strongly Tri-nil Clean Rings

Rana Mahammed Shafik, Nazar H. Shuker

This study explores the structure and properties of strongly Tri-nil clean rings. A ring is defined as strongly Tri-nil clean if every member in a ring can be expressed as the sum of a tripotent...

DOI: 10.33899/csmj.2025.156371.1164

Pages: 80-83
Credit Card Fraud Detection Using Feature Select Method and Improved Machine Learning Algorithm

Mohammed mansooor AL-Hammadi

In todays digital age, credit card fraud has become a serious issue, posing financial risks to individuals, businesses, and financial institutions alike. Detecting credit card fraud is crucial to...

DOI: 10.33899/csmj.2025.157705.1175

Pages: 122-133
The Performance of Different Video Segmentation or Video Shot Boundary Detection Techniques: A Survey

Rafal Ali Sameer

Video is a way to convey information on the internet which is more popular than the text. Video processing expanded with the using of videos in various fields and highly developing of communication...

DOI: 10.33899/csmj.2025.156866.1165

Pages: 134-143