Volume 18 Issue 1

Published: 2025-06-25

Contents


Research Paper
A Modified Sine Cosine Algorithm Based on A Novel Locally Weighted Method for Global Optimization Problems

Shahad Ibrahim Mohammed, Nazar Khalaf Hussein, Mohammed Abdulrazaq Alkahya

The sine cosine algorithm (SCA), a recently discovered population-based optimization technique, is used to resolve optimization issues. In this research, the study proposes employing the LWSCA...

Pages: 10-21
Appling A Hybrid Encryption Algorithm in Cloud Computing‎

Esraa Khalid Alobaydi, Muna M.T. Jawhar,

The rapid digital development has led to a steady increase in the use of cloud storage as a primary means of saving and sharing data and files. This development brought major challenges in the...

Pages: 58-65
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey

Omar Abed Najm, Ahmed Sami Nori,

Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in...

Pages: 125-130
Enhancing Reliability Engineering Through Weibull Distribution in R

Sameera Abdulsalam Othman,

Accelerated life testing is a fundamental practice in reliability engineering, making the evaluation of component or device performance over extended lifetimes impractical to encounter during...

Pages: 103-110
Semi-h-Open Sets and Semi-h-Continuity in Topological Spaces

Barah Mahmood Sulaiman,

In this study, we generalized two known open sets called semi-open and h-open sets to find a new type called semi-h-open set in topological space We have presented the relationship of several...

Pages: 96-102
Numerical Solution for fluid flow in Horizontal and Inclined Cavities

Iman Hashim Al-obaidi,

This study demonstrates how to control fluid flow in inclined and horizontal cavities. The equations governing the problem are established, including the two-dimensional nonlinear partial...

Pages: 84-91
Key Generation and Testing Based on Biometrics

shahd Abdulrhman Hasso, Alaa Aamer AbdulRaheeM,

Creating and testing a biometric key is a critical process used for security and identity verification .When using biometric traits such as fingerprints, facial features, iris patterns, earprints,...

Pages: 111-119
Solving Newell-Whitehead-Segel Equation By using Elzaki Transform and its inverse with The Homotopy Perturbation Method

Mohammed Mustafa Alsofey, Abdulghafor M. Al-Rozbayani,

This research is a combination of the homotopy perturbation method with Elzaki transform method and Elzaki inverse to solve some nonlinear partial differential equations. Where the method Elzaki...

Pages: 1-6
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation

Noor Gassan Abdullah, shahd Abdulrhman Hasso,

One of the primary challenges in Internet data transmission lies in safeguarding data from unauthorized access by potential attackers. The goal of content-adaptive steganography is to conceal data...

Pages: 66-73
Strongly Invo. T- Clean Rings

Rand Kanaan Alneamy, Nazar H. Shuker,

In this paper, we present the idea of a strongly invo. T-clean rings, which we define as rings with every a in R having the formula a = t + v, where t is a tripotent and v is an order two unit that...

Pages: 7-9
Software Defect Prediction Using Extreme Gradient Boosting(XGBoost) with Tune Hyperparameter

Tariq Najim AL-Hadidi, Safwan Omar Hasoon

Software applications have become widely spread in an unprecedented manner in our daily lives, controlling some of the most sensitive and critical aspects within institutions. Examples include...

Pages: 22-29
Land Ownership Management System in Mosul City

Walaa Assim ALhadidiu, Shayma Mustafa Mohi-Aldeen,

Technological development in all areas of life has played an effective role in the development of electronic systems. They have become one of the necessary modern building systems used by the...

Pages: 74-83
Review Paper
The Multilevel Encryption Model: A review

Mais Irreem A kamal, Laheeb Mohammad Ibrahim,

Multilevel encryption is a system used to protect sensitive data and information with multiple overlapping encryption methods. This system aims to increase the level of security by adding multiple...

Pages: 40-49
Braille Character Recognition System: Review

Rusul Hussein Hasan, Inaam Salman Aboud, Rasha Majid Hassoo,

The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell...

Pages: 30-39
Application of ic—open Sets in Topologies Via Ideals

Rana Ibraheem AL -jaheishi, Amir AL- siraj,

In this paper, new kinds of open sets inside ideal topological spaces are introduced; they are called ic - I - open,icc - I -open,weakly ic - I - open and weakly icc - I - open. Some properties and...

Pages: 92-95
On Types of Invo Clean Rings: Review

Mohammed Th. Al-Neima, Raida D. Mahmood,

In this paper, three types of rings were reviewed: invo-clean, invo-t-clean and invo-k-clean, the ring invo-clean is invo-t-clean and invo-k-clean. Since invo-t-clean ring is invo-k-clean when k=3....

Pages: 120-124
The Role of Artificial Intelligence in Enhancing Cyber Security using Deep Learning Techniques: A Review

Abeer Abdulkhalik Thanoon Alyoons, sabren hani altai,

Learning AI is used to detect various cyber-attacks, malicious attacks and unusual future threats in the network. Notice the pattern in which any illegal or suspicious activities behave, recognize...

Pages: 50-57