{"title":"Number of Spinal-Convex Polyominoes","authors":"Eman F. Mohomme","doi":"10.31642/jokmc/2018/060303","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060303","url":null,"abstract":"— : In his paper we describe a restricted class of polyominoes called spinal-convex polyominoes. Spinal-convex polyominoes created by two columns such that column 1 (respectively, column2) with at most two set columns sequence of adjacent ominoes and column 2 (respectively, column1) with at least one set column sequence of adjacent ominoes. In addition, this study reveals new combinatorial method of enumerating spinal-convex polyominoes .","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125157713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Certain properties of contra-T*12-continuous functions","authors":"H. Mustafa, Layth M. Alabdulsada","doi":"10.31642/jokmc/2018/060302","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060302","url":null,"abstract":"The concept of contra function was introduced by Dontchev [2], in this work, we use the notion of T*12-open to study a new class of function called a contra-T*12-continuous function as a generalization of contra-continuous.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Condensation to Fractal Shapes Constructing","authors":"Adil Alrammahi","doi":"10.31642/jokmc/2018/060301","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060301","url":null,"abstract":"Two properties must be available in order to construct a fractal set. The first is the selfsimilarity of the elements. The second is the real fraction number dimension. In this paper,condensation principle is introduced to construct fractal sets. Condensation idea is represented in threetypes. The first is deduced from rotation –reflection linear transformation. The second is dealt withgroup action. The third is represented by graph function.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object Detection and Recognition Using Local Quadrant Pattern Testing on The Skin Cancer Region","authors":"A. Hashim","doi":"10.31642/jokmc/2018/060202","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060202","url":null,"abstract":"Object detection and recognition is one of the important techniques in computer vision for searching and scanning and identifying an object in images or videos. Object detection and recognition enters into many important fields where one of the uses of object detection and recognition is to detect region of injury and determine the type of injury. This paper suggested a new effective method called Local Quadrant Pattern (LQP). The proposed method uses a window and passes it on all pixels of the image and uses the pixel direction to arrange the adjacent pixels. It also uses four code values to encode and then produce a texture feature matrix which is used to detect objects as well as extract features based on magnitude of pixels for image classification. The experiments were conducted on the infected regions in the skin and the results showed the ability of the method to detect regions of infection as well as the high accuracy in the classification of those regions. Keywords— Local Quadrant Pattern (LQP), Object Detection, Threshold, Local Ternary Pattern (LTP), Skin, Cancer","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encrypt Images Using Mutation Methods","authors":"S. Kharofa","doi":"10.31642/jokmc/2018/060204","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060204","url":null,"abstract":"Abstract— As a result of the tremendous development of information and communications technology, especially after the wide spread of the internet, the process of preserving images has become a major and important subject. The most important method to preserve images is the use of encryption, which aims to ensure the preservation of the privacy of images and not allowing anyone to tamper with or view them because they are either confidential or very special. Also, no one can understand the content of those images unless they have a means of encryption. In this research, a new methods has been applied in images encryption using mutation methods. Different analysis like correlation coefficient, and histogram analysis is applied for the verification of the performance of the suggested algorithm. Matlab language has been used to implement the suggested algorithm, because of its efficiency, accuracy and flexibility in giving results.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiparty Quantum Cryptography with Block Cipher RC6 (BMQKD)","authors":"Iqtidar Zohair","doi":"10.31642/jokmc/2018/060201","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060201","url":null,"abstract":"The proposed B-MQKD method uses a quantum key distribution to generate a key and provide an authentication amongst many parties. It uses concepts of block cipher by using RC6 algorithm for encryption. The mix concept in B-MQKD (quantum and block cipher) gives the algorithm more authentication, randomness, and security which make it difficult to find the original message by attackers. In this paper using BB84 among three parties make it possiple to give the key to many users in a secret way.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pairwise locally compact and compactification in double topological spaces","authors":"R. R. Mohsin","doi":"10.31642/jokmc/2018/060203","DOIUrl":"https://doi.org/10.31642/jokmc/2018/060203","url":null,"abstract":"The concept of intuitionistic topological space was introduced by Çoker. The aim of this paper is to generalize notions between bitopological spaces and double topological spaces and also give a notion of pairwise locally compact and compactification for double-topological spaces.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124591553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication of RSA via BAN logic","authors":"Israa N.A. Alsalhi, S. Albermany","doi":"10.31642/JOKMC/2018/060101","DOIUrl":"https://doi.org/10.31642/JOKMC/2018/060101","url":null,"abstract":"DOI : http://dx.doi.org/10.31642/JoKMC/2018/060101 Abstract-Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network dynamically that leading to be many threats targeting this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential, and can it be used in cognitive radio networks.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of a Classifier Performance Testing Methods: Support Vector Machine Classifier on Mammogram Images Classification","authors":"S. J. Mohammed, Thekra Abbas","doi":"10.31642/JOKMC/2018/060102","DOIUrl":"https://doi.org/10.31642/JOKMC/2018/060102","url":null,"abstract":"— This paper compares between testing performance methods of classifier algorithm on a standard database of mammogram images. Mammographic interchange society dataset (MIAS) is used in this work. For classifying these images tumors a multiclass support vector machine (SVM) classifier is used. Evaluating this classifier accuracy for classifying the mammogram tumors into the malignant, benign or normal case is done using two evaluating classifier methods that are a hold-out method and one of the cross-validation methods. Then selecting the better test method depending on the obtained classifier accuracy and the running time consumed with each method. The classifier accuracy, training time and the classification time are considered for comparison purpose.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Interesting Properties of a Novel Subclass of Multivalent Function with Positive Coefficients","authors":"Aqeel AL-khafaji, W. Atshan, S. Abed","doi":"10.31642/JOKMC/2018/060103","DOIUrl":"https://doi.org/10.31642/JOKMC/2018/060103","url":null,"abstract":"DOI : http://dx.doi.org/10.31642/JoKMC/2018/060103 Abstract— In this paper, we introduce a new class of multivalent functions defined by where is a subclass of analytic and multivalent functions in the open unit disc { | | }. Moreover, we consider and prove theorems explain Some of the geometric properties for such new class was such as, coefficient estimates, growth and distortion, extreme points, radii of starlikeness, convexity and close-to-convexity as well as the convolution properties for the class","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"531 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}