1.

Weak Armendariz Zero Knowledge Cryptosystem

Pages 1-6
Areej M. Abduldaim

2.

Robust and Secured Image Steganography using LSB and Encryption with QR Code

Pages 1-9
Hazim Noman Abed

3.

Prediction by using Artificial Neural Networks and Box-Jenkins methodologies: Comparison Study

Pages 1-16
Emaan Yousif Abdoon; Mohammed Habib Al- Sharoot

4.

On Fuzzy Measure on Fuzzy sets

Pages 7-12
Karrar S. Hamzah; Noori F. Al-Mayahi

5.

The effect of random waypoint mobility infrastructure for wireless networks

Pages 10-18
Aseil nadhum kadhum; Aseel nadhum kadhum

6.

Additivity of Higher Multiplicative Mappings in Rings

Pages 13-16
Rajaa C.Shaheen

7.

On ms-Convergence of Nets and Filters

Pages 17-25
Fieras Joad Obead Al-Ysaary

8.

Prediction by using spectral analysis and artificial neural networks methodologies: Comparison Study

Pages 17-33
Emaan Yousif Abdoon; Mohammed Habib Al- Sharoot

9.

Convert 2D shapes in to 3D images

Pages 19-23
Rasha falah; Rafeef mohammed

10.

E-Management System of Kirkuk University Based on Distributed Database

Pages 24-34
Banaz Anwer Qader; Kamal Hasan Jihad; Yalmaz Najm Alddeen Taher

11.

A New Subclass of Harmonic Univalent Functions

Pages 26-32
Najah Ali Jiben Al-Ziadi; Waggas Galib Atshan

12.

Coefficients Bounds for a General Subclasses of m-Fold Symmetric Bi-Univalent Functions

Pages 33-39
Najah Ali Jiben Al-Ziadi; Waggas Galib Atshan

13.

Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques

Pages 35-44
Ghadah Al-Khafaji; Shaymaa Fadhil

14.

SOME RESULTS ABOUT CORETRACTABLE MODULES

Pages 40-48
Shukur Neamah Al-aeashi; Inaam Mohammed Ali Hadi

15.

A Proposed Model for the Mutual Dependency Between QoE and QoS in Wireless Heterogeneous Networks

Pages 45-55
Hasan F. Khazaal; Rawaa I. Farhan; Baraa I. Farhan; Haider Th. Salim ALRikabi; Stavros Kotsopoulos; Stavros Kotsopoulos

16.

Equivalent of permutation polytopes with applications

Pages 49-53
Batool A. Hameed; Shatha A. Salman

17.

Rate of approximation of K-monotone functions in L_(ψ,p) (I) space , 0

Pages 54-56
Nada Zuhair Abd AL-Sada; Noor Hayder Abdul Ameer; Adel Salim Tayyah; Akeel Ramadan Mehdi; Dhurgham Aiham Kadhim Alshakarchi; Maytham Salman azeez; Emad Allawi Shallal; Saad Abdulkadhim Al-Saadi; Mehdi S. Abbas; Rana J.S. Al-janabi; Shroouq J.S. Al-janabi; Zinah Hussein Toman; Sarim H. Hadi; Noori F. AL-Mayahi; Ali Ayid Ahmad; Ahmed Chalak Shakir; Hassan Nadem Rasoul; Alaa Saleh Hadi; Ali Hassan Mohammed; Sara F. Hassan; Boushra Y. Hussein; Thekra Abbas; M.Nafea Jafaar; Hanadi A. AbdulSatter; Intisar Shadeed Al-Mejibli; Dhafar Hamed Abd Dhafar Hamed Abd; Salam Abdulkhaleq Noaman; Alaa H. Al-Muslimawi; Bashaeer K. Jassim; Haider Kadhim Hoomod; Intisar Al-Mejibli; Abbas Issa Jabboory; Farhan Dakhil Shyaa; Dhyaa Shaheed Al-Azzawy; Sinan Adnan Diwan; Ahmed Talip Hussein; Haider Jebur Ali; Habeeb Kareem Abdulla; Shatha S.Alhily

18.

Finger print Feature Extraction Using Hybrid Approach: QPSO and Bees Algorithms Based on 3D Logistic Map

Pages 56-68
Noor Hayder Abdul Ameer

19.

SS-Injective Modules and Rings

Pages 57-70
Adel Salim Tayyah; Akeel Ramadan Mehdi

20.

Plant layout design and assessment consideration of cellular manufacturing system via G.A

Pages 69-77
Dhurgham Aiham Kadhim Alshakarchi; Maytham Salman azeez

21.

(Quasi-)Injective Extending Gamma Modules

Pages 71-80
Emad Allawi Shallal; Saad Abdulkadhim Al-Saadi; Mehdi S. Abbas

22.

New method for Increasing watermarked image quality and security

Pages 78-85
Rana J.S. Al-janabi; Shroouq J.S. Al-janabi; Zinah Hussein Toman

23.

B-C^* algebra Metric Space and Some Results Fixed point Theorems

Pages 81-87
Sarim H. Hadi; Noori F. AL-Mayahi

24.

Black Hole Attack in Mobile Ad Hoc Network and its Avoidance

Pages 86-96
Ali Ayid Ahmad; Ahmed Chalak Shakir

25.

Integration of the Al-Tememe Transformation To find the Inverse of Transformation And Solving Some LODEs With (I.C)

Pages 88-93
Hassan Nadem Rasoul; Alaa Saleh Hadi; Ali Hassan Mohammed

26.

The Condition Order Spectrum

Pages 94-102
Sara F. Hassan; Boushra Y. Hussein

27.

Mammogram image with Wiener filter and CLAHE

Pages 97-102
Thekra Abbas; M.Nafea Jafaar

28.

On approximation f by (α,β,γ)-Baskakov Operators

Pages 103-114
Hanadi A. AbdulSatter

29.

Mushroom Diagnosis Assistance System Based on Machine Learning by Using Mobile Devices

Pages 103-113
Intisar Shadeed Al-Mejibli; Dhafar Hamed Abd Dhafar Hamed Abd

30.

Adaptive playfair cipher Crypto algorithm

Pages 114-121
Salam Abdulkhaleq Noaman

31.

Numerical analysis of Newtonian flows based on artificial compressibility AC method

Pages 115-128
Alaa H. Al-Muslimawi; Bashaeer K. Jassim

32.

Efficient Neighborhood Function and Learning Rate of Self-Organizing Map (SOM) for Cell Towers Traffic Clustering

Pages 122-130
Haider Kadhim Hoomod; Intisar Al-Mejibli; Abbas Issa Jabboory

33.

T-semimaximal submodules

Pages 129-133
Farhan Dakhil Shyaa

34.

Design of Intelligent Agent Based management security system for E-government

Pages 131-142
Dhyaa Shaheed Al-Azzawy; Sinan Adnan Diwan

35.

Limit Sets and Cartan D – space

Pages 134-140
Ahmed Talip Hussein; Haider Jebur Ali; Habeeb Kareem Abdulla

36.

Close-to-convex Function Generates Remarkable Solution of 2^nd order Complex Nonlinear Differential Equations

Pages 141-147
Shatha S.Alhily


Journal Management System. Powered by ejournalplus.com