Volume 18 Issue 1

Published: 2024-06-25

Contents


Research Paper
Solving Newell-Whitehead-Segel Equation By using Elzaki Transform and its inverse with The Homotopy Perturbation Method

Mohammed Mustafa Alsofey, Abdulghafor M. Al-Rozbayani

This research is a combination of the homotopy perturbation method with Elzaki transform method and Elzaki inverse to solve some nonlinear partial differential equations. Where the method Elzaki...

DOI: 10.33899/csmj.2024.140891.1073

Pages: 1-6
Strongly Invo. T- Clean Rings

Nazar H. Shuker, Rand Kanaan Alneamy

In this paper, we present the idea of a strongly invo. T-clean rings, which we define as rings with every a in R having the formula a = t + v, where t is a tripotent and v is an order two unit that...

DOI: 10.33899/csmj.2023.141140.1074

Pages: 7-9
A Modified Sine Cosine Algorithm Based on A Novel Locally Weighted Method for Global Optimization Problems

Shahad Ibrahim Mohammed, Nazar Khalaf Hussein, Mohammed Abdulrazaq Alkahya

The sine cosine algorithm (SCA), a recently discovered population-based optimization technique, is used to resolve optimization issues. In this research, the study proposes employing the LWSCA...

DOI: 10.33899/csmj.2023.142253.1080

Pages: 10-21
Software Defect Prediction Using Extreme Gradient Boosting(XGBoost) with Tune Hyperparameter

Tariq Najim AL-Hadidi, Safwan Omar Hasoon

Software applications have become widely spread in an unprecedented manner in our daily lives, controlling some of the most sensitive and critical aspects within institutions. Examples include...

DOI: 10.33899/csmj.2023.142739.1081

Pages: 22-29
Appling A Hybrid Encryption Algorithm in Cloud Computing‎

Esraa Khalid Alobaydi, Muna M.T. Jawhar

The rapid digital development has led to a steady increase in the use of cloud storage as a primary means of saving and sharing data and files. This development brought major challenges in the...

DOI: 10.33899/csmj.2023.144169.1092

Pages: 58-65
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation

Noor Gassan Abdullah, Shahd Abdulrhman Hasso

One of the primary challenges in Internet data transmission lies in safeguarding data from unauthorized access by potential attackers. The goal of content-adaptive steganography is to conceal data...

DOI: 10.33899/csmj.2023.144323.1094

Pages: 66-73
Land Ownership Management System in Mosul City

Shayma Mustafa Mohi-Aldeen, Walaa Assim ALhadidiu

Technological development in all areas of life has played an effective role in the development of electronic systems. They have become one of the necessary modern building systems used by the...

DOI: 10.33899/csmj.2024.144939.1097

Pages: 74-83
Numerical Solution for fluid flow in Horizontal and Inclined Cavities

Iman Hashim Al-obaidi

This study demonstrates how to control fluid flow in inclined and horizontal cavities. The equations governing the problem are established, including the two-dimensional nonlinear partial...

DOI: 10.33899/csmj.2024.145554.1101

Pages: 84-91
Semi-h-Open Sets and Semi-h-Continuity in Topological Spaces

Barah Mahmood Sulaiman

In this study, we generalized two known open sets called semi-open and h-open sets to find a new type called semi-h-open set in topological space We have presented the relationship of several...

DOI: 10.33899/csmj.2024.144876.1095

Pages: 96-102
Enhancing Reliability Engineering Through Weibull Distribution in R

Sameera Abdulsalam Othman

Accelerated life testing is a fundamental practice in reliability engineering, making the evaluation of component or device performance over extended lifetimes impractical to encounter during...

DOI: 10.33899/csmj.2024.145036.1098

Pages: 103-110
Key Generation and Testing Based on Biometrics

Alaa Aamer AbdulRaheeM, shahd Abdulrhman Hasso

Creating and testing a biometric key is a critical process used for security and identity verification .When using biometric traits such as fingerprints, facial features, iris patterns, earprints,...

DOI: 10.33899/csmj.2024.145539.1100

Pages: 111-119
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey

Omar Abed Najm, Ahmed Sami Nori

Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in...

DOI: 10.33899/csmj.2024.149422.1123

Pages: 125-130
Review Paper
Braille Character Recognition System: Review

Rusul Hussein Hasan, Inaam Salman Aboud, Rasha Majid Hassoo

The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell...

DOI: 10.33899/csmj.2023.143463.1082

Pages: 30-39
The Multilevel Encryption Model: A review

Mais Irreem Atheed, Laheeb Mohammad Ibrahim

Multilevel encryption is a system used to protect sensitive data and information with multiple overlapping encryption methods. This system aims to increase the level of security by adding multiple...

DOI: 10.33899/csmj.2024.143560.1084

Pages: 40-49
The Role of Artificial Intelligence in Enhancing Cyber Security using Deep Learning Techniques: A Review

Abeer Abdulkhalik Thanoon Alyoons, sabren hani altai

Learning AI is used to detect various cyber-attacks, malicious attacks and unusual future threats in the network. Notice the pattern in which any illegal or suspicious activities behave, recognize...

DOI: 10.33899/csmj.2024.143589.1085

Pages: 50-57
Application of ic—open Sets in Topologies Via Ideals

Rana Ibraheem AL -jaheishi, Amir AL- siraj

In this paper, new kinds of open sets inside ideal topological spaces are introduced; they are called ic - I - open,icc - I -open,weakly ic - I - open and weakly icc - I - open. Some properties and...

DOI: 10.33899/csmj.2024.146288.1104

Pages: 92-95
On Types of Invo Clean Rings: Review

Mohammed Al-Neima, Raida D. Mahmood

In this paper, three types of rings were reviewed: invo-clean, invo-t-clean and invo-k-clean, the ring invo-clean is invo-t-clean and invo-k-clean. Since invo-t-clean ring is invo-k-clean when k=3....

DOI: 10.33899/csmj.2024.146028.1103

Pages: 120-124