Volume 16 Issue 2
Published: 2025-06-25
Contents
Research Paper
Spectral Extension Property of Perturbed Triple Product on Semisimple Commutative Banach Algebras
مروان عزیز جردو, Amir A. Mohammed
Under a perturbed triple product defined on three semisimple commutative Banach algebras with the influence of two homomorphisms defined on two of them and that carry certain characteristics, we...
A Comprehensive Study of Traditional and Deep-learning Schemes for Privacy and Data Security in the Cloud
mohammed Fawzy sheet, Melad jader saeed,
After the availability of Internet infrastructure all over the world, and connectivity is no longer an obstacle over the Internet, cloud computing has emerged as a practical and ideal solution. A...
Hybridization of Swarm for Features Selection to Modeling Heart Attack Data
Omar Shakir, Ibrahim Ahmed Saleh
Predicting heart attacks using machine learning is an important topic. Medical data sets contain different features, some of which are related to the target group for prediction and some are not....
The Homotopy Perturbation Method to Solve Initial Value Problems of First Order with Discontinuities
Waleed Al-Hayani, Mohammed J. Ahmed
In this work, the homotopy perturbation method (HPM) is used to solve initial valueproblems of first order with various types of discontinuities. The numerical results obtained (arecompared) using...
Strongly Nil* Clean Ideals
Muayad Mohammed Noor Alali, Nazar Hamdoon Shuker
An element is known a strongly nil* clean element if a=e1- e1e2 + n, wheree1,e2 are idempotents andn is nilpotent, that commute with one another. An ideal I of a ring R is called a strongly nil*...
Use Different Mathematical Methods to Solve Three Dimensional Conduction Heat Equation in Cartesian Coordinate
Ahmed M.J. Jassim, AHMED SALAR
In this paper three-dimensional heat conduction equation in cartesian coordinate has been solved in two different methods one of which depends on the separation of variables and the other depends...
Review Paper
Different Biometrical Features for Detecting Human Intrusion Using Artificial Intelligence: Literature Review
Ansam Nazar Younis,
Many cases of theft and property trespass in addition to crimes occur in the world after these people break into people's homes and buildings illegally, so this article aims to shed light on most...
A survey on tamper detection techniques for digital images
Sundus Khaleel Ebraheem, Amina Taha
Recently, fake and fabricated images that have been manipulated for several purposes, including cosmetic and some for illegal purposes, have spread on social media. And because this is not an easy...
Melanoma Skin Lesion Classification Using Neural Networks: A systematic review
ahmed hammo, Mohammed Chachan Younis
Melanoma is considered a serious health disease and one of the most dangerous and deadly types of skin cancer, due to its unlimited spread. Therefore, detection of this disease must be early and...
A Comparative Study for Speech Summarization Based on Machine Learning: A Survey
Yusra Faisal Al-Irhaim, Hiba Adreese Altememi,
The most important aspect of human communication is speech. Lengthy media such as speech takes a long time to read and understand. This difficulty is solved by providing a reduced summary with...
Deep Learning for Retinal Disease Detection Surveys
Manar Y. Kashmoola, attallh salih
Retinal image analysis is crucial for The classification of retinal diseases such as Age Related Macular Degeneration (AMD), Diabetic Retinopathy (DR), Retinoblastoma, Macular Bunker, Retinitis...
Software Implementation Solutions of A Lightweight Block Cipher to Secure Restricted IoT Environment: A Review
RUAH MOUAD ALYAS AL_AZZAWI, SUFYAN SALIM MAHMOOD AL-DABBAGH,
With the development of the Internet of Things (IoT) technology, IoT devices are integrated into many of our daily lives, including industrial, security, medical, and personal applications. Many...