Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Al-Qadisiyah for Computer Science and Mathematics
Current
Archives
Editorial Team
About
About the Journal
Contact
Submissions
Copyright Agreement
Search
Abstracting and Indexing
Search
Register
Login
Home
/
Archives
/
Vol. 16 No. 1 (2024): JQCM
Vol. 16 No. 1 (2024): JQCM
DOI:
https://doi.org/10.29304/jqcsm.2024.16.1
Published:
2024-03-30
Computer Articles
Oil and Gas Production Forecasting Using Decision Trees, Random Forst, and XGBoost
Mays A. Al shabaan , Zainab N. Nemer
Comp. 9–20
pdf
Fire Detection by using DenseNet 201 algorithm and Surveillance Cameras images
Satar Shaker Muhammad, Jamal M. Alrikabi
Comp. 81–91
pdf
Review of Collective Decision Making in Swarm Robotics
Rusul Ibrahim, Muhanad Alkilabi, Ali Retha Hasoon Khayeat, Elio Tuci
Comp. 72-80
pdf
Optimal Drone Nodes Deployment to Maximize Coverage and Energy in WSNs Using Genetic Algorithms
Hayder Ayad Khudhair
COMP. 50–61
pdf
¬¬¬Instant Messaging Security: A Comprehensive Review of Behavior Patterns, Methodologies, and Security Protocols
Ahmed R. AlMhanawi1, Bashar M. Nema
Comp. 117–123
pdf
Detecting Brute Force Attacks on SSH and FTP Protocol Using Machine Learning: A Survey
Amer Ali Hamza, Jumma s urayh Al-Janabi
Comp. 21–31
pdf
Enhancing and Securing a Real-Time Embedded Face Recognition System using Raspberry Pi
Dhafer Alhajim , Hassoon Salman FAHAMA, Mohammed T.A
Comp. 92–104
pdf
Optimizing the Architecture of Convolutional Neural Networks Using Modified Salp Swarm Algorithm
Entesar H. Abdulsaed, Maytham Alabbas, Raidah S. Khudeyer
Math. 124–136
pdf
Web Scraping Scientific Repositories: Springer and Nature for University of Basrah
Zahraa Taufeeq Al-Madhhachi, Salma A. Mahmood
Comp. 1–8
pdf
Advancing Attendance: A Facial Recognition System Empowered by Deep Learning Techniques
Huda Al-Nayyef
Comp. 61–71
pdf
A Review on Deep Learning For Electroencephalogram Signal Classification
Sarah Kamil Gatfan
Comp. 137-151
pdf
Adaptive Hybrid Learning for Websites Vulnerability prediction
Mohannad Hossain Hadi, Karim Hashim Al-Saedi
Comp. 32–49
pdf
Mobile based Malware Detection using Artificial Intelligence Techniques a review
Mawj faez mahdi, Sarah Saadoon Jasim
Comp. 105–116
pdf
Math Articles
Some Separation Axioms Via D-Set in Bitopological Space
Hadeel Husham Kadhim
Math. 16–22
pdf
Fuzzy Anti-normed Spaces
Dunia Ameen Abd alsaheb , Noori Farhan Al Mayahi
Math. 65–78
pdf
Analyze a temperature and MHD peristaltic flow of sutterby fluid through a porous wavechannel in a rotating frame
Fatima Khalid Moeana, Dheia G. Salih Al-Khafajy
Math Page 34-49
pdf
Sinc approximation for solving fourth-order pseudo-Poisson equations
Nureddin Majed Al-haliji
Math. 84–92
pdf
Some Properties of Rings of the Type f(x),g(x)-clean
Abdelwahab El Najjar, Akram S. Mohammed
Math. 23–28
pdf
Applications of Gegenbauer Polynomials for Two Families of Bi-univalent Functions Associating λ-Pseudo-Starlike and Convex Functions with Sakaguchi Type Functions
Bedaa Alawi Abd , Abbas Kareem Wanas
Math. 1–15
pdf
Existence and Uniqueness Common Fixed Point in Fuzzy b-Matric Space
Ban Nazar Ali, Alia Shani Hassan
Math. 48–64
pdf
Triple-Zero On Weakly Pseudo Primary 2-Absorbing Sub-Module
Omar Hisham Taha , Marrwa Abdullah Salih
Math. 29–33
pdf
On Triple Sequences Space of Fuzzy Numbers Identified by Simple Elliptic Orlicz Function
Aqeel Mohammed Hussein
Math. 79–83
pdf
indexed
This work is licensed under a
Creative Commons Attribution 4.0 International License.
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
journaldetails
details
Journal Details
Journal Policy
Aims and Scope
About Paper Review
Review Process
Abstracting and Indexing
Feedback
guidelines
Guidelines for Authors
Instruction for Authors
Copyright Agreement
DECLARATION FORM
Example of Published Paper
Licenses and Copyright
Publishing Fees:
Current Issue