http://journals.uokufa.edu.iq/index.php/jkmc/issue/feedJournal of Kufa for Mathematics and Computer2018-05-28T08:43:31+00:00Asst.Prof. Abdulhamza hamzaAbdulhamza.hamza@uokufa.edu.iqOpen Journal SystemsJournal of Kufa for Mathematics and Computer aims to publish original research papers and survey articles in all areas of Mathematics, Statistics and Computer Science.http://journals.uokufa.edu.iq/index.php/jkmc/article/view/7148Journal staff2018-05-23T08:52:44+00:00alaa abdullhusein alnajimalaaauthor6@gmail.comJournal staff2018-05-23T08:52:44+00:00Copyright (c) 2018 Journal of Kufa for Mathematics and Computerhttp://journals.uokufa.edu.iq/index.php/jkmc/article/view/7149Contents2018-05-23T08:52:44+00:00alaa abdullhusein alnajimalaaauthor6@gmail.comContents2018-05-23T08:52:44+00:00Copyright (c) 2018 Journal of Kufa for Mathematics and Computerhttp://journals.uokufa.edu.iq/index.php/jkmc/article/view/7153Implicit in the development of parallel programming language using Visual Basic2018-05-23T08:52:44+00:00Zainab fahad mhawes al-naseriZainab.alnaseri@qu.edu.iqSeveral studies have been performed to investigate the benefits of parallel programming models, and compared the models with same language family. The parallel technique is applicable only when the programmer has a single computer with multiple processors to perform various tasks individually or the programmer number of different computers connected by a single network. Parallel programming model in computing is an idea of parallel computer architecture. This research introduced the concept of parallel programming models and languages. The present research mainly focused on the different parallel programming models proposed by previous researchers using distinct programming languages. Through analyzing the strengths and weaknesses of various programming models used for parallel computing, a new model is developed. Along with this, the concept of OOP (Object-oriented programming) in the context of parallel computing is also discussed. This research proposed a model named as Asynchronous Dynamic load Balancing (ADLB). ADLB model used MPI as avehicle for library implementation rather as an end-user programming system2018-05-23T08:52:44+00:00Copyright (c) 2018 Journal of Kufa for Mathematics and Computerhttp://journals.uokufa.edu.iq/index.php/jkmc/article/view/7154On a New Class of Meromorphic Multivalent Functions Defined by Fractional Differ-integral Operator2018-05-23T08:52:44+00:00Waggas Galib Atshanwaggas.galib@qu.edu.iqNajah Ali Jiben Al-Ziadinajah.ali@qu.edu.iqIn this work, we submite and study a newlclass of meromorphiccmultivalent functions defined by fractional differ-integral operator . We gain some geometric properties , such as, coefficient inequality, growth and distortion bounds, convolution properties, integral representation, radii of starlikeness and convexity, extreme points, weighted mean and arithmetic mean for functions belonging to the class2018-05-23T08:52:44+00:00Copyright (c) 2018 Journal of Kufa for Mathematics and Computerhttp://journals.uokufa.edu.iq/index.php/jkmc/article/view/7155On optimal periodic solution of differential equations2018-05-23T08:52:44+00:00Methaq Hamza GeemMethaq.Geem@qu.edu.iqthis paper dedicated to the construction of solution of a three time scale periodic singular perturbed non-linear quadratic optimal control problem by using the direct method. The algorithm of the method is the direct substitution of the postulated asymptotic expansion of the solution of the problem and then by the conditions of the problem we constructed of a series of problem and find terms of the asymptotic. We find the solution by using the Hamilton's function and maximum principle2018-05-23T08:52:44+00:00Copyright (c) 2018 Journal of Kufa for Mathematics and Computerhttp://journals.uokufa.edu.iq/index.php/jkmc/article/view/7156A classical approach for hiding encryption key in the same encrypted text document2018-05-28T08:43:31+00:00Prof. Dr. Taleb A. S. Obaidtasobaid@gmail.comAssist. Prof. Dr. Mohammed J. Khamimjkhami@yahoo.comDr. Lemya Gh. ShehabLemyaaldawood@yahoo.comData encrypting and steganography techniques each have its own merits and weaknesses. Crackers and hackers developed many software applications that can attack the weakness of these techniques and thus can reach to the meaning of the private information and its existence. In this paper, a simple technique is proposed to make use of encrypting and steganography merits simultaneously, and thus makes any attempt for breaking both techniques at the same time harder than applying each of them alone. The proposal uses English, Arabic, or mixed writing plain text. Encrypting the text by AES-encrypting algorithm with an encryption key of 128 bit long and then hiding the encrypted text with only one part of the encrypting key (sender key only), in another English/Arabic (cover), plain text. The text hiding technique is done according to the nonprintable characters of the Unicode character set method. The proposed technique is coded into a form of Matlab program. Experimenting with this paper technique shows how difficult to break the system and thus can applying it in emailing private documents between users connected to a virtual network on an insecure public channel2018-05-23T08:52:44+00:00Copyright (c) 2018 Journal of Kufa for Mathematics and Computerhttp://journals.uokufa.edu.iq/index.php/jkmc/article/view/7157Turán-Type Inequalities for Bessel, Modified Bessel and Kr ̈tzel Functions2018-05-23T08:52:44+00:00Piyush Kumar Bhandaribhandari1piyush@gmail.comS. K. Bissususilkbissu@gmail.comWe establish Turán-type inequalities for Bessel functions, modified Bessel functions, Kr ̈tzel function and Beta function, by using a new form of Cauchy–Bunyakovsky–Schwarz inequality. 2010 Mathematics subject classification: Primary 26D07; Secondary 33C10.2018-05-23T08:52:44+00:00Copyright (c) 2018 Journal of Kufa for Mathematics and Computer