Volume 17 Issue 1
Published: 2023-06-25
Contents
Article
BLOCK CIPHER PERFORMANCE AND RISK ANALYSIS
Yassin Hikmat Ismael, amina Alregabo
Block cipher algorithms are a very important issue in the field of information security. Their simple structure and software-based encryption allow users to implement them in several applications...
DOI: 10.33899/csmj.2023.179463
Prediction of COVID-19 Effect on Patients during Six Month After Recovery, by Using AI Algorithm
Ghayda A.A. Al-Talib, hanan aldabagh
People all over the world have experienced severe panic as a result of the novel coronavirus (COVID-19). To secure their future, it is crucial to undertake thorough evaluations in their...
DOI: 10.33899/csmj.2023.179470
Research Paper
Detect Multi Spoken Languages Using Bidirectional Long Short-Term Memory
Fawziya M. Ramo, Mohammed Kannah
Many speaker language detection systems depend on deep learning (DL) approaches, and utilize long recorded audio periods to achieve satisfactory accuracy. This study aims to extract features from...
DOI: 10.33899/csmj.2023.179455
Analytical Solution for Fluid Flow and Heat Transfer in a Three-Dimensional Inclined Horizontal Channel and Under The Influence of Thermal Radiation
Ahmed Jassim, AHMED SALAR
In this paper, the analytical solution to the problem of heat transfer and fluid flow was obtained by using the quadruple Laplace transform method. Temperature distribution and fluid flow...
DOI: 10.33899/csmj.2023.179458
First and Second Zagreb Coindices for Chains of Cycles
Ammar Raad Waadallah, Ahmed M. Ali
AbstractThe graphs which are used in this paper are simple, finite and undirected. The first and second Zagreb indices for every non-adjacent vertices (also called first and second Zagreb...
DOI: 10.33899/csmj.2023.179460
Performance of Spatial Distribution Quality by Ordinary Fuzzy Kriging for Soil Properties under Uncertainty
ghanim Mahmood dhaher, suhaib abd aljabbar abd albaqee
This research studies the spatial distribution quality of spatial interpolation methods. The research aims first to obtain unbiased estimator parameters based on regionalized variables in the study...
DOI: 10.33899/csmj.2023.179473
The Analytic solution for some non-linear stochastic differential equation by linearization (Linear-transform)
Abdulghafoor Jasim Salim, Nibal Sabah Abdulrhman
In this paper, we study a reducible method which is called linearization(Linear-transform) for some non-linear stochastic differential equations (SDEs) to linear by using the Ito-integrated...
DOI: 10.33899/csmj.2023.179475
On a family of holomorphic functions involving linear operator
Sipal S. Khalil, Abdul Rahman S. Juma
The purpose of the present article is to study and introduce the family of holomorphic univalent functions defined on the open unit disk incluing the linear operators reduced by using the...
DOI: 10.33899/csmj.2023.179478
New Concept of Finite Group (Zp^n q) on the Sum Graph with Some Topological Indices
Mahera R. Qasem, Akram S. M., nabeel arif
In this paper, we study the extended graph theory in the sum group via Zpnq which is Zpnqby two distinct orders, the sum is greatest than the order of the group Zpnq where p,q are prime numbers. We...
DOI: 10.33899/csmj.2023.179483
Using intelligence techniques to automate Oracle testing
Nour Sulaiman, safwan hasson
The software development life cycle includes software testing as a critical step. Oracle testing is necessary to determine if a particular test case detects an error because the purpose of testing...
DOI: 10.33899/csmj.2023.179485
Restricted Detour Polynomial of a Straight Chain of Wheel Graphs
Herish Omer Abdullah, Ivan Dler Ali
Restricted detour distance between two vertices and of a graph is the length of a longestu- v path for the induced condition (V (P))=P. The restricted detour polynomial depends on restricted...
DOI: 10.33899/csmj.2023.179505
A Sufficient Descent Property for a Different Parameter to Enhance Three-Term Method
Ghada Moayid Al-Naemi, Samaa Abdulkader Al-bakri
In this paper, we derive a new parameter k-1 for the three-term CG (N3T) algorithm for solving unconstrained optimization problems. As demonstrated by its calculations and proof, the parameter k-1...
DOI: 10.33899/csmj.2023.179508
On GAN-injective Rings
Raida D. Mahmood, Hazim T Hazim
If for any maximal right ideal P of B and a N(B) ,aB/ aP is almost N-injective, then a ring B is said to be right generalized almost N-injective. In this article, we present some significant...
DOI: 10.33899/csmj.2023.179510
Review Paper
Unsupervised and Semi-Supervised Speech Recognition System: A Review
Yusra Faisal Al-Irhaim, Mazin Ali Al-Zakarya
Voice is a behavioral biometric that may reveal a person's age, gender, ethnicity, and emotional state. Speaker recognition is the method of identifying individuals through their sounds. Despite...
DOI: 10.33899/csmj.2023.179466
Real Time System Scheduling Approach:Survey
Dhuha Basheer Abdullah, Israa Nasir Abood, Raya akram hamdi
Real-time systems play a major role in our today's life. They are used in essential control systems that rely on timely response and determined outcomes to work. The main real-time scheduling...
DOI: 10.33899/csmj.2023.179512





