Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Al-Qadisiyah for Computer Science and Mathematics
Current
Archives
Editorial Team
About
About the Journal
Contact
Submissions
Copyright Agreement
Search
Abstracting and Indexing
Search
Register
Login
Home
/
Archives
/
Vol. 9 No. 2 (2017): JQCM
Vol. 9 No. 2 (2017): JQCM
DOI:
https://doi.org/10.29304/jqcm.2017.9.2
Published:
2017-10-23
Math Articles
Weak Armendariz Zero Knowledge Cryptosystem
Areej M. Abduldaim
Math 1-6
PDF
On Fuzzy Measure on Fuzzy sets
Noori F. Al-Mayahi, Karrar S. Hamzah
Math 7-12
PDF
Additivity of Higher Multiplicative Mappings in Rings
Rajaa C.Shaheen
Math 13-16
PDF
On ms-Convergence of Nets and Filters
Fieras Joad Obead Al-Ysaary
Math 17-25
PDF
A New Subclass of Harmonic Univalent Functions
Waggas Galib Atshan, Najah Ali Jiben Al-Ziadi
Math 26-32
PDF
Coefficients Bounds for a General Subclasses of m-Fold Symmetric Bi-Univalent Functions
Waggas Galib Atshan, Najah Ali Jiben Al-Ziadi
Math 33-39
PDF
SOME RESULTS ABOUT CORETRACTABLE MODULES
Inaam Mohammed Ali Hadi, Shukur Neamah Al-aeashi
Math 40-48
pdf
Equivalent of permutation polytopes with applications
SHATHA A. SALMAN, BATOOL A. HAMEED
Math 49-53
PDF
Rate of approximation of K-monotone functions in L_(ψ,p) (I) space , 0
Nada Zuhair Abd AL-Sada
Math 54-56
PDF
SS-Injective Modules and Rings
Akeel Ramadan Mehdi, Adel Salim Tayyah
Math 57-70
PDF
(Quasi-)Injective Extending Gamma Modules
Mehdi S. Abbas, Saad Abdulkadhim Al-Saadi, Emad Allawi Shallal
Math 71-80
PDF
B-C^* algebra Metric Space and Some Results Fixed point Theorems
Noori F. AL-Mayahi, Sarim H. Hadi
Math 81-87
PDF
Integration of the Al-Tememe Transformation To find the Inverse of Transformation And Solving Some LODEs With (I.C)
Ali Hassan Mohammed, Alaa Saleh Hadi, Hassan Nadem Rasoul
Math 88-93
PDF
The Condition Order Spectrum
Boushra Y. Hussein, Sara F. Hassan
Math 94-102
PDF
On approximation f by (α,β,γ)-Baskakov Operators
Hanadi A. AbdulSatter
Math 103-114
PDF
Numerical analysis of Newtonian flows based on artificial compressibility AC method
Bashaeer K. Jassim, Alaa H. Al-Muslimawi
Math 115-128
PDF
T-semimaximal submodules
Farhan Dakhil Shyaa
Math 129-133
PDF
Limit Sets and Cartan D – space
Habeeb Kareem Abdulla, Haider Jebur Ali, Ahmed Talip Hussein
Math 134-140
PDF
Close-to-convex Function Generates Remarkable Solution of 2^nd order Complex Nonlinear Differential Equations
Shatha S.Alhily
Math 141-147
PDF
Robust and Secured Image Steganography using LSB and Encryption with QR Code
Hazim Noman Abed
Comp 1-9
PDF
The effect of random waypoint mobility infrastructure for wireless networks
Aseil nadhum kadhum, Aseel nadhum kadhum
Comp 10-18
PDF
Convert 2D shapes in to 3D images
Rasha falah .K, Rafeef mohammed .H
Comp 19-23
PDF
E-Management System of Kirkuk University Based on Distributed Database
Banaz Anwer Qader, Kamal Hasan Jihad, Yalmaz Najm Alddeen Taher
Comp Page 24 - 34
PDF
Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques
Ghadah Al-Khafaji, Shaymaa Fadhil
Comp Page 35 - 44
PDF
A Proposed Model for the Mutual Dependency Between QoE and QoS in Wireless Heterogeneous Networks
Hasan F. Khazaal, Rawaa I. Farhan, Baraa I. Farhan, Haider Th. Salim ALRikabi, Tasos Dagiuklas, Stavros Kotsopoulos
Comp Page 45 - 55
PDF
Finger print Feature Extraction Using Hybrid Approach: QPSO and Bees Algorithms Based on 3D Logistic Map
Noor Hayder Abdul Ameer
Comp Page 56 - 68
PDF
Plant layout design and assessment consideration of cellular manufacturing system via G.A
Dhurgham Aiham Kadhim Alshakarchi, Maytham Salman azeez
Comp Page 69 - 77
PDF
New method for Increasing watermarked image quality and security
Rana J.S. Al-janabi, Shroouq J.S. Al-janabi, Zinah Hussein Toman
Comp Page 78 - 85
PDF
Black Hole Attack in Mobile Ad Hoc Network and its Avoidance
Ali Ayid Ahmad, Ahmed Chalak Shakir
Comp Page 86 - 96
PDF
Mammogram image with Wiener filter and CLAHE
Thekra Abbas, M .Nafea Jafaar
Comp Page 97 - 102
PDF
Mushroom Diagnosis Assistance System Based on Machine Learning by Using Mobile Devices
Intisar Shadeed Al-Mejibli, Dhafar Hamed Abd
Comp Page 103 - 113
PDF
Adaptive playfair cipher Crypto algorithm
Salam Abdulkhaleq Noaman
Comp Page 114 - 121
PDF
Efficient Neighborhood Function and Learning Rate of Self-Organizing Map (SOM) for Cell Towers Traffic Clustering
Haider Kadhim Hoomod, Intisar Al-Mejibli, Abbas Issa Jabboory
Comp Page 122 - 130
PDF
Design of Intelligent Agent Based management security system for E-government
Dhyaa Shaheed Al-Azzawy, Sinan Adnan Diwan
Comp Page 131 - 142
PDF
Prediction by using Artificial Neural Networks and Box-Jenkins methodologies: Comparison Study
Mohammed Habib Al- Sharoot, Emaan Yousif Abdoon
Stat Page 1 - 16
PDF
Prediction by using spectral analysis and artificial neural networks methodologies: Comparison Study
Mohammed Habib Al- Sharoot, Emaan Yousif Abdoon
Stat Page 17 - 33
PDF
indexed
This work is licensed under a
Creative Commons Attribution 4.0 International License.
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
journaldetails
details
Journal Details
Journal Policy
Aims and Scope
About Paper Review
Review Process
Abstracting and Indexing
Feedback
guidelines
Guidelines for Authors
Instruction for Authors
Copyright Agreement
DECLARATION FORM
Example of Published Paper
Licenses and Copyright
Publishing Fees:
Current Issue