{"title":"Survey: (Blockchain-Based Solution for COVID-19 and Smart Contract Healthcare Certification)","authors":"Noor Sabah, A. Sagheer, O. Dawood","doi":"10.52866/ijcsm.2021.02.01.001","DOIUrl":"https://doi.org/10.52866/ijcsm.2021.02.01.001","url":null,"abstract":"The year 2020 has shown the quick spread and devastating effect of Coronavirus (COVID-19) on\u0000the world economy, health, and human life. Combating the COVID-19 pandemic is crucial. Blockchain technology\u0000can assist in the fight against the COVID-19 pandemic by assuring safe and reliable medical supplies, accurate\u0000identification of virus hot spots, and establishing data provenance to verify genuine personal protective equipment that\u0000is decentralized, reliable, traceable, and transparent. A major proportion of current healthcare systems are centralized\u0000and are short on privacy and information necessary for the detection of fraud connected to the certification by the\u0000COVID-19 vaccine. The quick vaccination rollout and the deployment of a global vaccination campaign are crucial\u0000and dependent on the availability of transparent and operational distribution chains, which may be audited by all\u0000the necessary parties. Blockchain technology might also be used to assure transparent monitoring, storage, and\u0000distribution of COVID19 vaccinations. Smart contracts are built for monitoring and tracking the proper circumstances\u0000of vaccine distribution in comparison to safe handling of vaccine producers, informing all network peers. This study\u0000aims to investigate the effectiveness of block chain and smart contracts in the health care system. The article presents a\u0000model of the decentralized infrastructure of the health care system. The blockchain and intelligent contract technology\u0000provided has shown promising results. The proposed solution is economically feasible and ensures data integrity,\u0000security, transparency, and traceability. Future work aims to expand the functionalities of smart contracts and the\u0000blockchain technology.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131763996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raed Abdulkareem Hasan, Hadeel W. Abdulwahid, Arwa Sahib Abdalzahra
{"title":"Using Ideal Time Horizon for Energy Cost Determination","authors":"Raed Abdulkareem Hasan, Hadeel W. Abdulwahid, Arwa Sahib Abdalzahra","doi":"10.52866/ijcsm.2021.02.01.002","DOIUrl":"https://doi.org/10.52866/ijcsm.2021.02.01.002","url":null,"abstract":"In most optimal VM placement algorithms, the first step to determine the proper time horizon, T\u0000for the prediction of the expected maximum future load, L. However, T is dependent on the proper knowledge of the\u0000required time for servers to switch from their initial SLEEP/ACTIVE state to the next desired state. The activities\u0000implemented by this policy are (a) to relocate the VM from an encumbered server, a server that operates in an\u0000undesirably high regime with applications forecasted to rise their burdens to compute in the subsequent reallocation\u0000cycles; (b) to conduct VM migration from servers that operate within the undesirable regime to shift the server to\u0000a SLEEP mode; (c) putting an idle server to SLEEP mode and rebooting the servers from the SLEEP mode at high\u0000cluster loads. A novel mechanism for forwarding arriving client desires to the utmost suitable server is implemented;\u0000thus, in the complete system, balancing the requested load is possible.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. K. Naji, Mona Ghassan Younis, Mohammad Naeemullah
{"title":"The Dynamics of a Single Species in a Polluted Environment","authors":"R. K. Naji, Mona Ghassan Younis, Mohammad Naeemullah","doi":"10.52866/ijcsm.2020.01.02.001","DOIUrl":"https://doi.org/10.52866/ijcsm.2020.01.02.001","url":null,"abstract":"This article proposed and analysed a nonlinear mathematical model that consist of a single species\u0000in a polluted environment (PE). The proposed model was also discussed in terms of its uniqueness, existence, and\u0000boundedness of the solution. Also, each possible equilibrium point was analysed for local stability, followed by\u0000investigation of the global dynamics of the system using the Lypanov functions. The effects of the presence of\u0000toxicants on the dynamics of a single species in the PE was numerically investigated","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132739501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet applications in libraries and information centers","authors":"Mohammed Thakir Shaamood","doi":"10.52866/ijcsm.2020.01.02.003","DOIUrl":"https://doi.org/10.52866/ijcsm.2020.01.02.003","url":null,"abstract":"The world is witnessing a marked and rapid change in the use of the Internet in all areas of life\u0000and this is a natural development. Because the existence of the web has swelled and increased and became a lot in\u0000various magazines depend on it and greatly. Our topic today is about Internet applications in libraries and information\u0000centers. How has library performance developed in general? What are the challenges facing librarians? What is the\u0000benefit of the students and researchers?\u0000Thanks to the presence of the Internet there has been a great revolution in the performance of libraries and traditional\u0000processes and developed many of them, for example, reference services, document delivery, resource sharing, and\u0000others.\u0000Librarians and staff in information centers face significant challenges in developing their Web site. And this returned\u0000to all those who come to the library benefit, where there is a schedule of dates and official holidays, planning\u0000of buildings within the library, information center for easy access to the destination and organization of different\u0000memberships in different categories, circulation and acquisition, and easy to announce the activities of various\u0000periodicals and seminars and know all the details and special rules. This research tries to introduce the impact of\u0000the technology on the libraries in terms of librarian and library visitors and the resources in the libraries","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128383104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2-Visible Submodules and Fully 2-Visible Modules","authors":"Mahmood S. Fiadh, W. Hanoon","doi":"10.52866/ijcsm.2020.01.02.004","DOIUrl":"https://doi.org/10.52866/ijcsm.2020.01.02.004","url":null,"abstract":"Let X be a T -module, T is a commutative ring with identity and K be a proper submodule of X. In this\u0000paper we introduce the concepts of 2-visible submodules and fully 2-visible modules as a generalizations of visible\u0000submodules and fully visible modules resp., where K is said to be 2-visible whenever K=I2 K for every nonzero\u0000ideal I of T and AT -module X is called fully 2-visible if for any proper submodule of it is 2-visible.Study some of\u0000the properties of these concepts also discuss the relationship 2-visible submodules and fully 2-visible modules with\u00002-pure submoules and other related submodules and modules resp. are given","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117031391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ali, M. Abdullah, Shams N. Abdul-wahab, Mohammad Alsajri
{"title":"A Brief Review of Big Data Analytics Based on Machine Learning","authors":"A. Ali, M. Abdullah, Shams N. Abdul-wahab, Mohammad Alsajri","doi":"10.52866/ijcsm.2020.01.02.002","DOIUrl":"https://doi.org/10.52866/ijcsm.2020.01.02.002","url":null,"abstract":"Owing to the exponential expansion in the data size, fast and efficient systems of analysis are\u0000extremely needed. The traditional algorithms of machine learning face the challenge of learning bottlenecks such\u0000as; human participation, time, and the accuracy of prediction. But, the efficient and fast methods of dynamic\u0000learning offer considerable advantages like lower human participation, rapid algorithms of learning, and easiness\u0000implementation. This review paper presents the researches with a brief display for recently existing works in big data\u0000analytics and the effective algorithms of machine learning, furthermore, the issues of resources allocation in big data","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130852884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical factors affecting the adoption of open source software in public organizations","authors":"M. Yaseen, S. A. Abd, Ibarhim Adeeb","doi":"10.52866/ijcsm.2020.01.02.005","DOIUrl":"https://doi.org/10.52866/ijcsm.2020.01.02.005","url":null,"abstract":"Context: The way public organizations produce, acquire, use, and commercialize software is\u0000changing as a result of open source software (OSS). Because of the numerous benefits provided by open source\u0000software, public organizations began to use it to meet their demands. As a result, governments implement various\u0000measures to encourage and facilitate OSS use. A variety of factors continue to influence the choice to implement\u0000OSS, which can have a positive or negative impact on the adoption process.\u0000Objective: The study’s purpose is to explore the most critical factors that may influence the open source software\u0000adoption process, which are drawn from chosen case studies from various domains in public organizations. Based on\u0000their findings, the authors produced a guideline to tell prospective adopters about the most crucial factors that they\u0000may confront during the adoption process.\u0000Method: Authors chose a handful of publications that address three public domains: healthcare, municipal\u0000government, and higher learning institutions. We looked for articles based on various criteria, beginning with their\u0000relevance to open source software adoption in general and, more specifically, in the public sector. We also screened\u0000the papers based on whether they were written in simple English or if they were written in another language.\u0000Results: According to the findings, government and top management support, reliability, security, availability, and\u0000cost ownership are the most influential elements that contributed to the adoption process’s success. Lacking of\u0000in-house development, connectivity, quality, computing resources, and expertise were identified as barriers to the\u0000adoption of open source software in specific sectors.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Door controller for handicapped people based on face\u0000recognition and voice command technique","authors":"R. T. Rasheed","doi":"10.52866/ijcsm.2019.01.01.03","DOIUrl":"https://doi.org/10.52866/ijcsm.2019.01.01.03","url":null,"abstract":"There are a few houses that indicate an application for various implementations, they can indicate\u0000all types of systems that direct any door lock as well as many other apparatuses. Facial identification that can be\u0000considered as a significant section for safety and monitoring, specifically for the handicapped, has the ability to be\u0000a way which treats with biometrics and employed for identifying any facial image by employing basic face\u0000characteristics. A system of face recognition based on Raspberry Pi utilizing recognition mechanisms as well as\u0000conventional face detection will be provided. Thus, the approach that image-built biometrics utilizes a Raspberry\u0000Pi has been depicted. The goal here could be to transfer face recognition towards a level where the system has the\u0000ability to change RF I-Cards’ use and a password for getting access into all security systems, and reviving the\u0000system as well as keeping the door safe hacking people, specifically via utilizing an authorized person’s photo, we\u0000turn raspberry pi off and do not turn it on just by an order from cell phone of the authorized person. The presented\u0000proposal’s outcome can be a system which utilizes face recognition via employing Raspberry Pi and OpenCV, and\u0000it works on Android, and its percentage can be 99.63%. It ought to be secured cost-effective, easy to use and of\u0000high performance, that is employed in all applications of smart homes","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123983359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}