Volume 13 Issue 2
Published: 2019-12-17
Contents
Research Paper
Studying the Bessell Equation of Complex Order
Thair Y. Thanoon, Omar Thaher shalal
In this paper we derive Bessel equation of complex order (n + i), after that generalized recurrence relations from Bessel equation of order (n) to Bessel equation of complex order (n + i) and will...
DOI: 10.33899/csmj.2020.163517
A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code
Nada Yassen Kasm Yahya, Zyiad Adrees Hamad Youines
In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an...
DOI: 10.33899/csmj.2020.163511
Build a Real-Time Home Security Alarm System Using a Kinect Sensor
Zaid A. Mundher, Khalida Basheer, Safaa Ayad Najeeb, Rami Zuhair
Surveillance camera systems have been widely used in homes, businesses and other places of work. These systems with its all capabilities and features provide protection to people who uses them. In...
DOI: 10.33899/csmj.2020.163512
Blind Steganalysis using One-Class Classification
Mohammed A. Karem M., Ahmed Sami Nori
Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the...
DOI: 10.33899/csmj.2020.163518
Design and Implement an Android Application to Remotely Control a Mindstorm NXT Robot
Zaid A. Mundher, Noora Ammar Salim, Baraa Abdulmunem, Raghad Muwafaq
Nowadays, robotics technology has become very popular in all fields of human life. Many robots have been already used in different applications such as indoor service, military undertaking,...
DOI: 10.33899/csmj.2020.163513
Effect of Magnetic Field on Blood Flow in Stenoted Arteries
Rotaina J. Essa, Nawara J. Essa
In this paper, the effect of magnetic field on blood flow in stenoted arteries was studied, stokes equations in polar coordinates were used to describe such flow. All flow characteristics were...
DOI: 10.33899/csmj.2020.163519
A New Method to Convert the DNA Sequence of Human to a QR Code
Sadoon Hussein Abdullah, Zahraa Tariq Abdulhamid
Data transmission, security and authenticity, nowadays is considered the major source of problems. To face these problems a suitable solution have to be forwarded . Steganography is forwarded one...
DOI: 10.33899/csmj.2020.163514
A Proposed Method for Feature Selection using a Binary Particle Swarm Optimization Algorithm and Mutual Information Technique
Omar Saber Qasim, Mustafa Ayham Abed Alhafedh
Feature selection is one of the most important issues in improving the data classification process. It greatly influences the accuracy of the classification. There are many evolutionary algorithms...
DOI: 10.33899/csmj.2020.163520
OMU: An Ontology For Mosul University
Ban Sharief Mustafa, Ibrahiem Adnan
Nowadays, data from different real-time data streams are coming in. The classical relational database systems cannot manage such big data. Big data should be managed in a way that keeps the...
DOI: 10.33899/csmj.2020.163515
On MLGP- Rings
Raida D. Mahmood, Ebtehal S. Mageed
An ideal K of a ring R is called right (left) generalized pure (GP -ideal) if for every a K, there exists m Z+, and b K such that am= amb ( am = b am) . A ring R is called MLGP-ring if every...
DOI: 10.33899/csmj.2020.163521
Improving Message Embedding by using some Attributes of Color Image
Ahmed Saadi Abdullah
In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System...
DOI: 10.33899/csmj.2020.163516





