Iraqi Journal For Computer Science and Mathematics <table class="data" style="font-size: 0.875rem; height: 329px;" width="561" bgcolor="#f0f0f0"> <tbody> <tr valign="top"> <td width="30%"><strong>Journal title</strong></td> <td width="80%"><strong>Iraqi Journal for Computer Science and Mathematics </strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Indexing</strong></td> <td width="80%"><strong><a href="">Scopus</a></strong></td> </tr> <tr valign="top"> <td width="30%"> <p><strong>Online ISSN</strong></p> <p><strong>Print ISSN</strong></p> </td> <td width="80%"> <p><strong>2788-7421</strong></p> <p><strong> <span class="fontstyle0">2958-0544</span> <br /></strong></p> </td> </tr> <tr valign="top"> <td width="30%"><strong>Frequency</strong></td> <td width="80%"><strong>4 issues per year</strong></td> </tr> <tr valign="top"> <td width="30%"> <p><strong>DOI</strong></p> </td> <td width="80%"> <p><strong>prefix 10.52866</strong></p> </td> </tr> <tr valign="top"> <td width="30%"> <p><strong>Editor in Chief </strong></p> <p> </p> <p> </p> <p><strong>Editor in Chief </strong></p> <p> </p> <p> </p> <p><strong>Managing Editor</strong></p> </td> <td width="80%"> <p><strong><em><a href="">Assist. Prof. Dr.Mohammad Aljanabi</a>, Full time editor at Iraqi Journal for Computer Science and Mathematics, College of Education, Al-Iraqia University, Iraq </em></strong></p> <p><strong><em></em></strong></p> <p><a href=""><strong>Assoc. Prof.Ahmed Shihab Albahr</strong></a><strong><a href=";hl=en">i</a>, Iraqi Comission for Computers and Informatics, Iraq</strong></p> <p><strong><em>Email:</em></strong></p> <p><strong><a href="">Assoc. Prof.Mohd Arfian Ismail</a>, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, Malaysia </strong></p> <p><strong><em>Email:</em></strong></p> <p> </p> </td> </tr> <tr valign="top"> <td width="30%"><strong>Organized by</strong></td> <td width="80%"><strong>Department of Computer, College of Education, Al-Iraqia University, Iraq</strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Citation Analysis</strong></td> <td width="80%"><strong><a href=";src=s&amp;st1=Iraqi+Journal+For+Computer+Science+and+Mathematics&amp;sid=79923ed8f98395bd8143dc21bf0c114b&amp;sot=b&amp;sdt=b&amp;sl=60&amp;s=SRCTITLE%28Iraqi+Journal+For+Computer+Science+and+Mathematics%29&amp;origin=searchbasic&amp;editSaveSearch=&amp;yearFrom=Before+1960&amp;yearTo=Present">Scopus</a> | <a href=";hl=en&amp;authuser=1">Google Scholar</a></strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Acceptance Rate:</strong></td> <td width="80%"><strong>5%</strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Review Speed:</strong></td> <td width="80%"><strong>90 days </strong></td> </tr> <tr valign="top"> <td width="30%"> </td> <td width="80%"> </td> </tr> </tbody> </table> <div> </div> <div><strong>Before submission</strong>,<br />You have to make sure that your paper is prepared using the<strong> <a href="">IJCSM paper Template</a>, or <a href="">Latex Template </a></strong>has been carefully proofread and polished and conformed to the<a href=""> author guidelines</a>.<strong> </strong><br /> <div id="homepageImage"> </div> </div> <div id="tabs"><strong>Online Submissions</strong></div> <div> <ul> <li>Already have a username/password for Iraqi Journal for Computer Science and Mathematics? <a href=""><strong>GO TO LOGIN</strong></a> </li> <li>Need a username/password? <strong><a href="">GO TO REGISTRATION </a></strong></li> </ul> </div> <div>Registration and login are required to submit items online and to check the status of current submissions. </div> <div> <p> </p> </div> en-US (Dr. Mohammad Aljanabi) (Dr. Mohammad Aljanabi) Sat, 08 Jun 2024 10:01:42 +0000 OJS 60 Unlocking the Potential: Synergizing IoT, Cloud Computing, and Big Data for a Bright Future <p>The convergence and integration of the Internet of Things (IoT), Cloud Computing (CC), and Big Data (BD) offer huge potential for transformative progress that will support the massive industrial revolution that is so prevalent in today’s digital landscape. This prompts an exploration of the synergies among these three domains and investigates how their integration can unlock new opportunities for a brighter future. This integration seamlessly connects billions of IoT devices, leverages the potential of CC, and efficiently manages vast datasets generated by these devices. The amalgamation of BD analytics with IoT and CC empowers organizations to extract invaluable insights, foster data-driven decision-making, and fuel innovation across diverse industries. Nevertheless, the incorporation of these systems also gives rise to notable difficulties, encompassing issues such as data protection, worries about privacy, the ability to scale, and the management of data. The paper delves into these challenges, explores strategies, and examines the hurdles and best practices to address them effectively through a comprehensive examination of the potential benefits, challenges, and mitigation strategies. In addition, this paper offers insights into how synergizing IoT, CC, and BD can pave the way for a brighter, more promising future in technology and society.</p> zeena alkateeb, Dhuha Abdullah Copyright (c) 2024 zeena alkateeb, Dhuha Abdullah Mon, 10 Jun 2024 00:00:00 +0000 The New Strange Generalized Rayleigh Family: Characteristics and Applications to COVID-19 Data <p>In this paper, we introduce a novel family of continuous distributions known as the Odd Generalized Rayleigh-G Family. Within this family, we present a special sub-model known as the odd Generalized Rayleigh Inverse Weibull (OGRIW) distribution. The OGRIW distribution is derived by combining the T-X family and the Generalized Rayleigh distribution. We provide a comprehensive expansion of the (PDF) and (CDF) for the OGRIW distribution. Additionally, we investigate several mathematical properties of the OGRIW distribution, including moments, moment-generating function, incomplete moments, quantile function, order statistics and Rényi entropy. To estimate the model parameters, we employ the maximum likelihood method, aiming to identify the parameter values that maximise the likelihood of the observed data.</p> <p>Finally, we apply the proposed OGRIW distribution to two real COVID-19 datasets from Mexico and Canada. The results of these applications demonstrate that the new distribution exhibits remarkable flexibility and outperforms other comparative distributions in terms of accurately modelling the COVID-19 data.</p> <p> </p> Alaa A. Khalaf, Mundher A. khaleel Copyright (c) 2024 Alaa A. Khalaf, Mundher A. khaleel Mon, 10 Jun 2024 00:00:00 +0000 Solving tri-criteria: total completion time, total late work, and maximum earliness by using exact, and heuristic methods on single machine scheduling problem <p>The presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two exact methods are important; a Branch and Bound algorithm (BAB) and a complete enumeration (CEM) method are applied to solve the three proposed MSP criteria by finding a set of efficient solutions. The experimental results showed that CEM can solve problems for up to jobs. Two approaches of the BAB method were applied: the first approach was BAB without dominance rule (DR), and the BAB method used dominance rules to reduce the number of sequences that need to be considered. Also, this method can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. In addition, to find good approximate solutions, two heuristic methods for solving the problem are proposed, the first heuristic method can solve up to jobs, while the second heuristic method can solve up to jobs. Practical experiments prove the good performance regarding the two suggested approaches for the original problem. While for a sub-problem the experimental results showed that CEM can solve problems for up to jobs, the BAB without dominance rule (DR) can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. Finally, the heuristic method can solve up to jobs. Arithmetic results are calculated by coding (programming) algorithms using (MATLAB 2019a)</p> <p> </p> Nagham Muosa Neamah, Bayda A. Kalaf Copyright (c) 2024 Nagham Muosa Neamah, Bayda A. Kalaf Mon, 10 Jun 2024 00:00:00 +0000 Comparison of non-linear time series models (Beta-t-EGARCH and NARMAX models) with Radial Basis Function Neural Network using Real Data <p>This paper presents a comparison of three different non-linear time series modelling approaches: NARMAX (Non-linear Autoregressive Moving Average with Exogenous Inputs), Beta-t-EGARCH (Beta t Exponential Generalized Autoregressive Conditional Heteroscedasticity), and Radial Basis Function Neural Networks (RBFNN) applied to weekly stock market index data.</p> <p>We will explain three types of models and compare their compositions and structures. Then, we will show which model gives better predictions. To study series data, the comparison involved analysing the structure of the model and its errors in various time series models and summarising their findings. We divide the data into two parts: training data to structure the time series and testing. The training data tests the model's predictions. Then, we can analyse the model with the errors and the best deterrence predictions. After selecting the NARMAX and Beta-t-EGARCH models, we test them with specific criteria. The best choice is finding the model with the lowest average errors.</p> <p>For this study, we analysed the weekly average closing of the Aramco 2222 index from 15 December 2019 to 16 July 2023 and made 187 observations.</p> Hiba Abdullah, Nihad S. khalaf, Nooruldeen A. Noori Copyright (c) 2024 Hiba Abdullah, Nihad S. khalaf, Nooruldeen A. Noori Mon, 10 Jun 2024 00:00:00 +0000 Resource Allocation and Edge Computing for Dual Hop Communication in Satellite Assisted UAVs enabled VANETs <p>VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge Computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the UAVs.Through these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. From the results and discussion, it has been proven that the proposed RAEDH-SAVs attained maximum results in terms of energy efficiency, delivery ratio, and throughput.</p> Mustafa Maad Hamdi, Sami Abduljabbar Rashid, Ahmed Adil Nafea Copyright (c) 2024 Mustafa Maad Hamdi, Sami Abduljabbar Rashid, Ahmed Adil Nafea Thu, 13 Jun 2024 00:00:00 +0000 A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech <p>The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation, "financial technologies (FinTech), around the globe. However, the security of FinTech systems and networks remains critical. This research paper comprehensively reviews cybersecurity issues and their mitigation measures in FinTech. Four independent researchers reviewed relevant literature from IEEE Xplore, ScienceDirect, Taylor &amp; Francis, Emerald Insight, Springer, SAGE, WILEY, Hindawi, MDPI, ACM, and Google Scholar. The key findings of the analysis identified privacy issues, data breaches, malware attacks, hacking, insider threats, identity theft, social engineering attacks, distributed denial-of-service attacks, cryptojacking, supply chain attacks, advanced persistent threats, zero-day attacks, salami attacks, man-in-the-middle attacks, SQL injection, and brute-force attacks as some of the significant cybersecurity issues experienced by the FinTech industry. The review paper also suggested authentication and access control mechanisms, cryptography, regulatory compliance, intrusion detection and prevention systems, regular data backup, basic security training, big data analytics, use of artificial intelligence and machine learning, FinTech regulatory sandboxes, cloud computing technologies, blockchain technologies, and fraud detection and prevention systems as mitigation measures for cybersecurity issues. However, tackling cybersecurity issues will be paramount if FinTech is to realize its full potential. Ultimately, this research will help develop robust security mechanisms for FinTech systems and networks to achieve sustainable financial inclusion.</p> Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, Mostafa Abotaleb Copyright (c) 2024 Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, Mostafa Abotaleb Mon, 10 Jun 2024 00:00:00 +0000