About
AL-Rafidain Journal of Computer Science and Mathematics (RJCSM) is a peer-reviewed, open-access scientific journal publishing under Creative Commons Attribution 4.0 International (CC-BY) license. This journal has been published by the College of Computer Science and Methematics, University of Mosul, Iraq, since June 2004. It's dedicated to advancing research in the fields of computer science, mathematics, and their interdisciplinary applications by providing a platform for high-quality, original research contributions from scholars and practitioners worldwide. RJCSM requires a 100 US$ fee for publishing an accepted manuscript. Any governmental or non-governmental organization does not financially support the journal.
______________________________________________________________________________________________________
AL-Rafidain Journal of Computer Science and Mathematics (RJCSM) is a signatory to the Sustainable Development Goals (SDG) Publishers Compact. RJCSM supports the following U.N. Sustainable Development Goals (SDG) :
1- Zero Hunger: End hunger, achieve food security, improve nutrition, and promote sustainable agriculture.
2- Quality Education: Ensure inclusive and equitable quality education and promote lifelong learning opportunities for all.
3- Clean Water: Ensure the availability and sustainable management of water and sanitation for all.
4- Affordable and clean energy: Ensure access to affordable, reliable, sustainable, and modern energy for all.
5- Industry, innovation, and infrastructure: Build resilient infrastructure, promote inclusive and sustainable industrialization, and foster innovation.
6- Sustainable cities and communities: Make cities and human settlements inclusive, safe, resilient, and sustainable.
Current Issue
Vol. 13 No. 1 (2019): Volume 13 Issue 1
Volume 13 Issue 1
Published: 2025-06-25
Contents
Research Paper
17 New Existences linear [n,3,d]19 Codes by Geometric Structure Method in PG(2,19)
Nada Yassen Kasm Yahya, Mustafa Nadhim Salim,
The purpose of this paper is to prove the existence of 17 new linear [337,3,318]19, [289,3,271]19, [266,3,249]19, [246,3,230]19, [219,3,204]19, [206,3,192]19, [181,3,168]19, [157,3,145]19,...
New Parameter of CG-Method for Unconstrained Optimization
Hamsa Th. Chilmeran, Satia A. Al-Taie, Enaam Gh. Saeed,
In this paper, we derived a new parameter by equating the modified QN direction which is suggested by [7] and the standard CG method which satisfied the sufficient descent condition and the global...
Use the Brute_Force Pattern Matching Algorithm for Misuse Intrusion Detection System
Haleema Essa Sulaiman,
Security issues, like network intrusion and viruses, have been increased widely with the growth of computer applications and networks. Therefore, it becomes necessary to develop methods to protect...
Proposed Algorithm For Using GLCM Properties To Distinguishing Geometric Shapes
Kifaa Thanoon,
In this research, an algorithm was used to look at the characteristics of a set of images for geometric shapes and then to classify them into totals based on four characteristics obtained from the...
Hybrid Method between the Discrete Wavelets Translate Technique and the Chaos System Based by the Least Significant Bit Algorithm to Encrypt and Hide a Digital Video File
Hasan Maher Ahmed,
The use of computers today is the most important and widespread means of storing, retrieving and circulating information through local and international networks and smart phones. Thus it is...
Image Enhancement Techniques for Images at Blur Motion and Different Noises
Sahlah Abed Ali,
Image restoration is an art to improve image quality by disposing of reducing the amount of noise and blurring present in the image. So it is one of the research titles of interest to the...
A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata
Ansam O. Abdulmajeed, Fatima M. Abdullatif, Wafaa A. Mustafa,
The present research was aimed to design and implement an algorithm that combines cryptography and steganography to achieve a higher level of security. The algorithm hid encrypted text into color...
Applying the Method of Enhancing Feedback Control On a 4D Hyperchaotic System
Mahasin Thabit Younis,
In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System...
A Robust Spectral Three-Term Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems
Abbas Y. Al-Bayati, Sabreen M. Abbas,
In this paper, we investigated a new improved Conjugate Gradient (CG) algorithm of a Three-Term type (TTCG) based on Dai and Liao procedure to improve the CG algorithm of (Hamoda, Rivaie, and Mamat...
Income Tax for Employees using Visual Basic and Access Database
Ruba T. Ibrahim, Mohamed I. Mohamed, Nashwan A. Ramadan,
In previous years, database applications were built in the form of a file system, but many disadvantages were found after that, such as: data replication , inconsistency while storing, difficulty...
Detection and Classification of Emotional State Based on Speech Signal
Hiba Adreese Younis, Mrewan Mustafa, Rahma Raad,
In this research, an algorithm was proposed to automatically classify the mood of the speaker by referring to his speech. Three moods were adopted in this study, namely joy, sadness and anger in...