About the Journal

Journal title Wasit Journal of Computer and Mathematics Science
Indexing

Online ISSN

Print ISSN

2788-5879

2788-5887 

Frequency 4 issues per year

DOI

prefix 10.31185

Editor in Chief 

 

 

 

Managing Editor of Computer Science section

 

Managing Editor of Mathematics Section

Assoc. Prof.Mohd Arfian Ismail, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, Malaysia 

Email: arfian@ump.edu.my 

 

Assist. Prof. Dr.Mohammad Aljanabi, Department of Computer, College of Education, Al-Iraqia University, Iraq 

 Email:mohammad.khaleel@aliraqia.edu.iq

Assist.Prof.Dr.Hijaz Ahmad, Near East University, Nicosia, Cyprus

Email: hijaz.ahmad@neu.edu.tr 

 

Organized by  College of Computer and Information Technology – University of Wasit, Iraq
Citation Analysis Scopus  | Google Scholar
Acceptance Rate: 40%
Review Speed: 90 days 
   
Before submission,
You have to make sure that your paper is prepared using the WJCMS paper Template, or Latex Template has been carefully proofread and polished, and conformed to the author's guidelines.  
Online Submissions
Registration and login are required to submit items online and check current submissions' status. 

 

Current Issue

Vol. 3 No. 3 (2024)
Published: 2024-10-02

Computer

  • An Adaptive Activity Cycling Technique for Energy Management in Wireless Sensor Networks (WSNs)

    Hayder Khudhair
    1-10
    DOI: https://doi.org/10.31185/wjcms.256
  • Assessing Institutional Performance Using Machine Learning Algorithms

    zainabalwan anwer, Ahmad Abdalrada, Ihtiram Raza Khan
    11-21
    DOI: https://doi.org/10.31185/wjcms.263
  • Cloud-Based Service for Fingerprint Image Matching

    Ethar Abdul Wahhab Hachim
    22-30
    DOI: https://doi.org/10.31185/wjcms.290
  • Email Spam Detection Using a Hybrid Approach of Feedforward Neural Network and Penguin Optimization Algorithm

    Layth Al-busultan
    31-44
    DOI: https://doi.org/10.31185/wjcms.282
  • Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly

    Hussein Abdulkhaleq Saleh alsharya
    45-59
    DOI: https://doi.org/10.31185/wjcms.268
  • New Heuristics Method for Malicious URLs Detection Using Machine Learning

    Maher Kassem Hasan
    60-67
    DOI: https://doi.org/10.31185/wjcms.267
  • Predicting the Optimal Treatment for Diseases Using Whale Optimization Algorithm

    Sudad Abed, Zuhal Adel Madlool
    68-78
    DOI: https://doi.org/10.31185/wjcms.273
  • Texture Analysis and Classification using Local Binary Patterns and Statistical Features

    Hasan Maher
    79-88
    DOI: https://doi.org/10.31185/wjcms.279
  • Internet of Things Optimal Routing based on Markov-Reinforcement Learning Algorithm

    Jamal M.Ali Radha, Raza Y. Abdulrahman
    89-98
    DOI: https://doi.org/10.31185/wjcms.271
View All Issues