Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Al-Qadisiyah for Computer Science and Mathematics
Current
Archives
Editorial Team
About
About the Journal
Contact
Submissions
Copyright Agreement
Search
Abstracting and Indexing
Search
Register
Login
Home
/
Archives
/
Vol. 17 No. 1 (2025): JQCM
Vol. 17 No. 1 (2025): JQCM
DOI:
https://doi.org/10.29304/jqcsm.2025.17.1
Published:
2025-03-30
Computer Articles
Advances in Distributed Scheduling Algorithms: A Three-Layer Architecture Integrating Deep Reinforcement Learning and Energy Optimization (2023-2024)
Ali Mohammed Ahmed , Manar Younis Kashmola
Comp. 62–71
pdf
Technology in Sumerian Text Translation: A Review of Tools and Techniques
Sajad M. Shah, Karim Q. Hussein
COMP. 122–131
pdf
Enhanced Malware Detection for IoT Networks Utilizing a 2D-CNN with Data Augmentation on the Malimg Dataset
Iman Fadhil Saleh
Comp. 179-191
pdf
IoT Applications Using Clustering Protocols in Wireless Sensor Networks wsns: Review
Rafa Sami Braiber, Mussab Riyadh
Comp. 240–251
pdf
A Review of Planted Motif Problem Types
Wajih Abdul Ghani Abdul Hussain, Hussein Keitan Al-Khafaji, Thekra Abbas
Comp. 41–51
pdf
Machine Learning Approach for Network Cyber Intrusion Detection
Osamah Adil Raheem
Comp. 95-102
pdf
Deep Learning Based Recognition of Arabic Alphabet Sign Language ArASL: A Study with EfficientNetB3
Farah Jawad Al-Ghanim
Comp. 157–165
pdf
Secure Cloud Storage Using Multi-Modal Biometric Cryptosystem: A Deep Learning-Based Key Binding Approach
Ali Amer Abd-Aljabbar, Dalal Abdulmohsin Hammood, Leith Hamid Abed
COMP. 214–229
pdf
Predicting the Quality of Software by Using Cat Swarm Optimization (CSO) Algorithm
Zuhal Adil Madlool
Comp. 298–307
pdf
Forecasting Dissolved Oxygen in Lakes Using Different AI Models
Zahraa Ch. Oleiwi, Karrar Khudhair Obayes , Nagham Kamil Hadi, Rahmah.Q yaseen, Asaad Jabbar Sahib
Comp. 18–27
pdf
Enhanced Fraudulent Detection Using Isolation Forest and Multi-Cluster Deep Learning
Hayder K. Fatlawi
Comp. 72–80
pdf
Enhancing Attack Detection in Android Environment Through Software Based on Machine Learning Methods
Shatha hamead Othman , Huda Abdulaali abdulbaqi
Comp. 132–144
pdf
Improving Medical Diagnosis Using Missing Data Treatment Techniques: A Case Study on Thyroid Data
Sajjad Basim Abdulyasser
Comp. 192–201
pdf
Classification of Remote Sensing Dataset Imagery Using Deep Learning Techniques
Zainab Nasser, Ehsan Ali Al-Zubaidi, Ehsan Ali Al-Zubaidi
Comp. 252–273
pdf
Blockchain Analysis, Challenges and Applications: A Review
Haider Mohammed Abdulnabi, Sara Mohammed Younis
Comp. 52–61
pdf
Analysis of AI- Empower Predictive Models for Predicting Student Performance in Higher Education
Husam Kadhim Gharkan , Mustafa Jawad Radif, Ali Hakem Alsaeedi
Comp. 103–121
pdf
Phishing Attacks Detection and Prevention Techniques: An Overview
Ali A. Alani, Adil Al-Azzawia
Comp. 166-178
pdf
Modeling and Analyzing a Comprehensive Framework of Big Data Value Chain
Riyam Qasim Mubarak Salih
Comp. 230–239
pdf
Extraction New Features
Nidhal Hasan Hasaan, Lamia Abed Noor Muhammed
Comp. 28–40
pdf
Survey for Open Shop Scheduling
Tabark Nameer Abd Ali , Luma S. Hasan
Comp. 81–94
pdf
Gender Classification from Human Face Images Using Deep Learning Based on MobileNetV2 Architecture
Nisreen Ryadh Hamza
Comp. 145-156
pdf
Evaluation System for Multiple-Choice Questions Using Optical Mark Recognition: A Survey
Eman R. Ali, Narjis M. Shati
Comp. 202-213
pdf
Advancements in Image Processing Approaches for Brain Tumor Diagnosis: An Article Review
Lubab Ahmed Tawfeeq , Samera Shams Hussein , Sukaina Sh Altyar
COMP. 274–297
pdf
A Novel Approach to Automated Detection of AI-Generated Text
Halah Mohammed Abbas
Comp. 1–17
pdf
Math Articles
Pure Essential-Coessential and Pure Essential-Coclosed Submodules
Omar Hameed Ibrahim, Nuhad Salim Al-Mothafar
Math. 9–15
pdf
Blood Flow Analysis in the Influence of a Magnetic Field in a Stenotic Artery
Samah F. Jaber AL-khulaifawi, Dheia G. Salih Al-Khafajy
Math 130–141
pdf
A Simplified Mathematical Study of Local Computation Algorithms for Efficient Hypergraphs Coloring
Ikram Hussein Khafeef
Math 76–88
pdf
New Families of Bi-Univalent Functions Associated with the Quotient of Analytic Functions
Noor Yasser Gubair, Abbas Kareem Wanas
Math 113–120
pdf
Coefficient Estimates for a Subclass of Bi-Univalent Function Associated with Borel Distributions Using the Subordination Principle
Elaf Ali Hussein, Ehsan Mejeed Hameed, Rafid Habib Buti
Math. 16–24
pdf
On Subclasses of Bi-Univalent Functions Using Quasi-Subordination
Sara Falih Makttoof , Waggas Galib Atshan, Ameera N. Alkiffai
Math 89–100
pdf
Weakly Nearly Primary Submodules
Ali Sh. Ajeel, Khaled Y. Jhad
Math. 1–8
pdf
On Special Fuzzy Differential Superordination For Univalent Functions Defined by Integral Operator
Raghda Naser Abdul-Hussain, Waggas Galib Atshan
Math 101–112
pdf
Approximate of fuzzy homomorphism and fuzzy derivation on Banach Algebra
Mohammed Salih Sabah, Shaymaa Alshybani
Math 50–60
pdf.
Synchronization State in the Coupled Van Der Pol Oscillators within a Small Invariant Subspace
Mary Ghadbaan Thoubaan
Math 25–31
pdf
Results on New Subclasses of m-fold Symmetric Bi-Univalent functions using Coefficient Inequalities
Sara Falih Makttoof, Ameera N. Alkiffai, Waggas Galib Atshan
Math 121–129
pdf
indexed
This work is licensed under a
Creative Commons Attribution 4.0 International License.
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
journaldetails
details
Journal Details
Journal Policy
Aims and Scope
About Paper Review
Review Process
Abstracting and Indexing
Feedback
guidelines
Guidelines for Authors
Instruction for Authors
Copyright Agreement
DECLARATION FORM
Example of Published Paper
Licenses and Copyright
Publishing Fees:
Current Issue