Table of content

Journal of Kufa for Mathematics and Computer

مجلة الكوفة للرياضيات والحاسوب

ISSN: 11712076
Publisher: University of Kufa
Faculty: Mathematics and Computer Science
Language: Arabic and English

This journal is Open Access

About

Description of The Journal
The Journal is one of the major contribution to the Scientific Research Programmes at University of Kufa. It is published by Faulty of Mathematics and Computer Sciences at the University of Kufa.
The Journal is mainly concern with publications of a high quality researches that meet the publication conditions in a specialist of Mathematics and Computing. It is quarterly journal, to include two numbers during a year (paper and electronic).
The journal release its first issue successfully in April 2010, followed by four other numbers that contain several papers submitted for publication, of which many papers presented and accepted by our first scientific conference held by our faculty, entitled “Recent Trends in Information Technology and Mathematics for the period 13-14 April 2011 .
The last number V is dedicated to papers presented and accepted at our second scientific research conference, entitled “The First International Scientific Conference for Information Technology , Telecommunications and E-learning for the period 24 – 25 April 2012. The Conference is held by our faculty in co-operation with College of Education for Girls and College for Education, and Research Centre for Information Rehabilitation.

Loading...
Contact info

الهاتف الخاص بالمجلة/07601504330
magazine.csm@uokufa.edu.iq البريد الالكتروني

Table of content: 2019 volume:6 issue:1

Article
Authentication of RSA via BAN logic

Authors: Israa N.A. Alsalhi
Pages: 1-7
Loading...
Loading...
Abstract

Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network dynamically that leading to be many threats targeting this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential, and can it be used in cognitive radio networks.


Article
Comparison of a Classifier Performance Testing Methods: Support Vector Machine Classifier on Mammogram Images Classification

Authors: Sura Jasim Mohammed
Pages: 8-12
Loading...
Loading...
Abstract

This paper compares between testing performance methods of classifier algorithm on a standard database of mammogram images. Mammographic interchange society dataset (MIAS) is used in this work. For classifying these images tumors a multiclass support vector machine (SVM) classifier is used. Evaluating this classifier accuracy for classifying the mammogram tumors into the malignant, benign or normal case is done using two evaluating classifier methods that are a hold-out method and one of the cross-validation methods. Then selecting the better test method depending on the obtained classifier accuracy and the running time consumed with each method. The classifier accuracy, training time and the classification time are considered for comparison purpose


Article
Some Interesting Properties of a Novel Subclass of Multivalent Function with Positive Coefficients

Loading...
Loading...
Abstract

In this paper, we introduce a new class of multivalent functions defined by where is a subclass of analytic and multivalent functions in the open unit disc { | | }. Moreover, we consider and prove theorems explain Some of the geometric properties for such new class was such as, coefficient estimates, growth and distortion, extreme points, radii of starlikeness, convexity and close-to-convexity as well as the convolution properties for the class


Article
Modification Advanced Encryption Standard for Design Lightweight Algorithms

Authors: Mustafa M. Abd Zaid --- Soukaena Hassan
Pages: 21-27
Loading...
Loading...
Abstract

The acknowledgment of IoT requires a colossal measure of sensor hubs which have limited battery power, memory, computational latency and communication bandwidth to obtain contributions from the associated objects. In the current developments of the resource constraint environments, the trend is shifted towards lightweight cryptographic algorithm. Many lightweight cryptographic algorithms have been developed and also existing algorithms are modified in terms of resource constraint environment.

Keywords

Table of content: volume:6 issue:1