AL-Rafidain Journal of Computer Science and Mathematics (RJCSM)  is a peer-reviewed, open-access scientific journal publishing under Creative Commons Attribution 4.0 International (CC-BY) license. This journal has been published by the College of Computer Science and Methematics, University of Mosul, Iraq, since June 2004. It's dedicated to advancing research in the fields of computer science, mathematics, and their interdisciplinary applications by providing a platform for high-quality, original research contributions from scholars and practitioners worldwide. RJCSM requires a 100 US$ fee for publishing an accepted manuscript. Any governmental or non-governmental organization does not financially support the journal.

______________________________________________________________________________________________________

AL-Rafidain Journal of Computer Science and Mathematics (RJCSM)  is a signatory to the Sustainable Development Goals (SDG) Publishers Compact.  RJCSM supports the following U.N. Sustainable Development Goals (SDG) :

SDG 1 – Quality Education

Ensure inclusive and equitable quality education and promote lifelong learning opportunities for all.

SDG 2 – Gender Equality

Achieve gender equality and empower all women and girls.

(Relevant to promoting women in STEM, digital inclusion, and tech-driven empowerment).

SDG 3 – Industry, Innovation, and Infrastructure

Build resilient infrastructure, promote inclusive and sustainable industrialization, and foster innovation.

(Core to computer science, mathematics, AI, and innovation research).

SDG 4 – Sustainable Cities and Communities

Make cities and human settlements inclusive, safe, resilient, and sustainable.

(Relevant to smart cities, IoT, sustainable urban tech solutions).

Vol. 19 No. 1 (2025): Volume 19 Issue 1

Volume 19 Issue 1

Published: 2025-06-01

Contents


Research Paper
Reactive routing protocol is one of the most important parameters in MANET, so a study of their performance is done in the next sub sections using NS2

MOHAMMED JABER ALAWADI

Mobile ad hoc network is a creation of portable devices; they create a network with infrastructure on the fly that are ever changing. As in the previous network structure, each node performs both...

Pages: 18-27
Investigation a Conjuacy a Conjugacy Coefficient for Conjugate Gradient Method to Solving Unconstrained Optimization Problems

Mays Basil Jarjis, Hamsa Th. Chilmerane

In this research, a new conjugacy coefficient is derived for conjugate gradient method(C.G) and a new direction was obtained. In theory, this direction achieve sufficiently desent condition by...

Pages: 28-33
Generalization of the Transformation Method to the Stratonovich Formula for Solving Stochastic Differential Equations

Ali mahmood alojedi, Abdulghafoor J. Salim

In this research, the reducible method or what is called the transformation method was generalized to the Stratonovich formula used to solve stochastic differential equations (SDEs), and the...

Pages: 34-40
Complex dynamics of a family Cubic-Logistic map

baraa salim ahmed, Salma Muslih M. Farris

In [1] , we introduce a new family of the Logistic map, namely the cubic logistic maps L= {L_ (x)=x^2 (1-x):>0,xR}. In this work we study the complex dynamics of this family i.e. L= {L_ (z)=z^2...

Pages: 41-47
Reducing Execution Time of Pixel-Based Machine Learning Classification Algorithms Using Parallel Processing Concept

Aliaa Shaker Mahmoud, Mohammed Chachan Younis

Parallel processing is essential in machine learning to meet the computational requirements resulting from the complexity of algorithms and the size of the dataset, by taking advantage of the...

Pages: 53-66
Haemoglobin Levels Analysis Using Robust Partial Least Square Regression Models

Taha Huseein Ali, Mahammad Mahmoud Bazid

The Robust Partial Least Square Regression method is used to handle outliers and increase the explanation proportion, but it does not reduce the average of the mean square error. In this article,...

Pages: 84-95
Minimising Security Deviations in Software-Defined Networks Using Deep Learning

mohammed sami alghaloom

This study aims to enhance the security of Software-Defined Networks (SDN) byemploying deep learning techniques to detect cyber threats and mitigate attacks. A comprehensive data analysis was...

Pages: 96-104
Dealing with Outliers in ARMA Time Series Analysis Using Hampel Filter and Wavelet Analysis

Heyam Abd Al-Majeed A.A.Hayawi

Outliers affect the accuracy of the estimated parameters of ARMA time series models which can be handled by the Hampel filter. In this article, wavelet shrinkage is proposed to handle outliers of...

Pages: 113-121
A Novel Lotka-Volterra Model for Analyzing the Dynamic Relationship Between Financial Corruption and Society.

Dilbar M.sharif Abdullah, Faraj Y. Ishak

we introduce a new predator-prey system and prove the existence, uniqueness, and stability of the proposed system. The main tools used in the study are the Picard approximation iteration and the...

Pages: 144-153
A Computer System for Measuring the Relationship of Smell and Pain

ADRIAN DAVID CHEOK, Timothy Adeyi

Smell is popularly believed to influence pain, even though several of these claims currently lack significant scientific or engineering support. This paper proposes a computing system for...

Pages: 154-168
AI-Driven Non-Invasive Diagnosis of Diverse Medical Conditions Through Nail Image Analysis with High-Performance Ensemble Classifier

Abeer Mohamad Alshiha, Wai Lok Woo

In this research, the application of deep learning methods for the classification of human nail diseases using image analysis is investigated. The aim was to establish a non-invasive, automatic...

Pages: 169-177
Improved Dai–Liao Conjugate Gradient Methods for Large-Scale Unconstrained Optimization

Basim A. Hassan, Alaa Luqman Ibrahim, abd elhamid mehamdia

This research introduces and evaluates two enhanced conjugate gradient methods for unconstrained optimization, building upon the DaiLiao conjugacy condition and further refined through the...

Pages: 178-186
Review Paper
Artificial Intelligence for Smoking Detection: A Review of Machine Learning and Deep Learning Approaches

Mohammed Sami Al-Hayali, Fawziya Mahmood Ramo

Cigarette smoking poses a major challenge to public health worldwide and has serious health consequences. Recent advances in deep learning, machine learning, Artificial Intelligence (AI), big data...

Pages: 1-17
Student attendance and evaluation system : A review

Sura Hasan Falih, Yaseen Hikmat Ismael

In recent years, technologies have brought about significant changes in education, with digitization becoming a key feature that can enhance the quality and effectiveness of the educational...

Pages: 48-52
Software Defect Prediction Based On Deep Learning Algorithms : A Systematic Literature Review

Akhlas Tariq Hasan, Shayma Mustafa Mohi-Aldeen

Software bug prediction (SDP) techniques identify bugs in the early stages of the software development life cycle through a series of steps to produce reliable and high-quality software. Deep...

Pages: 67-79
The strongly Tri-nil clean rings

Rana Mahammed Shafik, Nazar H. Shuker

This study explores the structure and properties of strongly Tri-nil clean rings. A ring is defined as strongly Tri-nil clean if every member in a ring can be expressed as the sum of a tripotent...

Pages: 80-83
Machine Learning Techniques for Kinship Verification: A Review

Olivia Khalil Oraha, Yusra Faisal Mohammad

Kinship verification is an automatic determining process of people relationships, if two or more individuals are in kin relation or not. Since the verifying of a kinship is the most challenging...

Pages: 105-112
Credit card fraud Detection using Feature select method and improved machine learning algorithm

Mohammed mansooor AL-Hammadi

In todays digital age, credit card fraud has become a serious issue, posing financial risks to individuals, businesses, and financial institutions alike. Detecting credit card fraud is crucial to...

Pages: 122-133
The Performance of Different Video Segmentation or Video Shot Boundary Detection Techniques: A Survey

Rafal Ali Sameer

Video is a way to convey information on the internet which is more popular than the text. Video processing expanded with the using of videos in various fields and highly developing of communication...

Pages: 134-143