ORIGINAL_ARTICLE
Implementation of Wireless Area Network for Patient Monitoring System
There are many critical cases in which the patients need continuous monitoring by the medical staff. Implementing wireless sensor network in medical field helps the medical staff to monitor the patients remotely. This system is designed to collect the patient’s physiological parameters, and store them in the database. The doctor monitors the patient continuously in real time. In this project the biomedical sensor nodes used are temperature and heart rate sensors; Arduino UNO is used as a microcontroller for data processing, and then the messages are transmitted to the base station via Bluetooth wireless technology. The Raspberry Pi is used as a system personal server. The results, reports and other information related to the patients are displayed in website pages which are suitable for the desktop, Personal Digital Assistance (PDA) and mobile devices.
https://ijccce.uotechnology.edu.iq/article_133955_0025490fce2f7ae42450c0f6050799e7.pdf
2017-12-28
1
9
Patient Monitoring
Biomedical sensors
Microcontroller
Bluetooth
Arduino
Raspberry pi
Hassan
J. Hassan
1
AUTHOR
Noor
Kadhim Hadi
2
AUTHOR
ORIGINAL_ARTICLE
Drip Irrigation Scheduling System Using Sensor Network
The agriculture is vulnerable and sensitive to climate changes. These changes reduce the production while encouraging the growth of bush, which lead to water consumption extravagantly. In this paper, we proposed an automatic drip irrigation system based on calculating the required crop water and irrigation depth. The aim of the proposed system is to automatically compute irrigation scheduling of certain crop according to a crop type and climatological conditions. This system includes two parts: hardware and control center. The sensors send their real-time readings of the soil moisture and climatic information to the monitoring part of the system wirelessly and then save them in database server. The hardware part consists of a main unit represented by ARDUINO Uno and sensors of soil moisture and DHT11. The wireless communication link between the hardware and control center parts are covered using Bluetooth HC-06. In the control center, the database is built using SQL server 2015 and the related Graphical User Interface (GUI) frames is designed using Visual Studio C#. The proposed system has been presented in a prototype to represent the case study and the obtained results show a clear reduction of power and water consumption.
https://ijccce.uotechnology.edu.iq/article_133956_93d49a4ac61ee014ec89be7e5fd15aae.pdf
2017-12-28
10
23
Irrigation
Water Consumption
embedded systems
Sensors
Microsoft Visual Studio C
SQL server
Bluetooth HC
Zeena
Mohammed Faris
1
AUTHOR
Dr.
Muayad Sadik Croock
2
AUTHOR
ORIGINAL_ARTICLE
Depth Estimation and Shape Reconstruction of a 2D Image Using N.N. and Bézier Surface Interpolation
Inferring 3D image from 2D image is an advance topic in computer vision. This article considers a 2D image depth estimation of an object and reconstructs it into a 3D object image. The 2D image is defined by slices, where each slice contains a set of points that are located along the object contour and within the object body. The depths of these slices are estimated using the neural network technique (N.N.), where five factors (slice length, angle of the incident light and illumination of some of points that located along the 2D object, namely control points) are used as inputs to the network. The estimated depths of the slices are mapped into a 3D surface using the interpolation technique of the Bezier Spline surface. Our model was tested and evaluated using different objects with different and complex shapes. The results showed an effective performance of the proposed approach.
https://ijccce.uotechnology.edu.iq/article_133957_b9c4a1e6343a3754a87bd68358a11521.pdf
2017-12-28
24
32
Object depth estimation
Bezier Spline surface interpolation
Mapping
Luma
Issa Abdul
1
AUTHOR
Kreem
2
AUTHOR
ORIGINAL_ARTICLE
Proposed Pseudo Random Generator Based on RC5 Block Cipher
Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic primitives. This paper presents a 64-bit random number generator with a high generation speed and a good random sequences by employing the RC5 encryption algorithm round functions with some changes in the usage
of the key, where two keys have been used with an initial vector to start the sequence generator. This generator can be used as a keys generator for any security system or to generate an intermediate password for signing process, and it can be adapted in many other applications, such as random pattern generation, games, etc. Examining the sequences shows great results in terms of randomness and security by achieving a difference near 0.5, this value is the best result, and a high undependability on the previous generated sequences by also achieving a difference more than 0.5, frequency, serial and run test came out with a near optimality results.
https://ijccce.uotechnology.edu.iq/article_133958_e579ff9cc14dc9d22575158a9105ca46.pdf
2017-12-28
33
41
Pseudo random generator
randomness
Block Cipher
Cryptography
security
Ashwaq
Talib Hashim
1
AUTHOR
Zaid
Mundher Radeef
2
AUTHOR
ORIGINAL_ARTICLE
Convolutional Code Constraint Length over Rayleigh Fading Channel: Performance Evaluation and Hardware Aspects
In this paper, the performance of convolutional code constraint length for bandwidth efficient transmission over AWGN and Rayleigh fading channels is presented. Using intensive simulation and in terms of BER error floor, we evaluate the performance of binary phase shift keying (BPSK) mapping scheme. In addition, the hardware implementation considerations based on the Digital Signal Processor (DSP) platform of convolutional decoding are discussed. To be more specific, the code constraint length effect on both memory management and clock cycles are considered.
https://ijccce.uotechnology.edu.iq/article_133959_6a6899c0c7df0bcd9470aedb1f4747c8.pdf
2017-12-28
42
48
Convolutional codes
DSP
Hardware
Processing time
A.
E. Abdelkareem
1
AUTHOR
ORIGINAL_ARTICLE
Echo Cancellation in Telecommunications Using Variable Step-Size, Dynamic Selection, Affine Projection Algorithm.
This paper focuses on how to improve the performance of Acoustic Echo Cancellation AEC in voice communication systems. A variable step-size, dynamic affine projection algorithm named as DSVSSAPA is devised for this purpose. The proposed version combines the merits of the variable step size APA as well as uses dynamic selection of the input vectors to reduce its computational power, which has not been found in literature elsewhere. The version proposed in this paper overcomes drawbacks incorporated with the standard AP algorithm. These drawbacks are convergence speed-misalignment trade off problem and the high computational complexity of the algorithm. The proposed algorithm reduces the computational complexity by carrying the update after satisfying a specific criterion. Performance of the proposed echo canceller is evaluated and compared with those obtained from the same echo canceller but based on conventional algorithms such as the normalized least mean square algorithm NLMS and the original affine projection algorithm APA. The performance is measured in terms of misalignment and echo return loss enhancement ERLE. Simulation results showed superior ERL performance of the DSVSSAPA compared to other algorithms. It also achieves 17.73% reduction in computational complexity compared with conventional APA which is useful in portable communication applications.
https://ijccce.uotechnology.edu.iq/article_133960_3896cbe8201db7eec624327ef5ba4524.pdf
2017-12-28
49
58
Sara
M. Motar
1
AUTHOR
Ali
O. Abid Noor
2
AUTHOR
ORIGINAL_ARTICLE
Design a Hybrid Cryptosystem Based Chaos and Sharing for Digital Audio
With the growth rate of wireless communication with internet and
multimedia. The wireless network has expanded their applications in our life.
Cryptography and steganography play important role within data security. This
paper chiefly produces a novel hybrid cryptography and steganography for
digital audio base chaos system and secret sharing scheme algorithm. These
algorithms have multilevel of processing with the digital audio to increase the
level of security. In this algorithm, digital audio was encrypted with a novel
encryption method based Lorenz chaos map. Then, divide the encrypted audio
to N encrypted audio based on secret sharing scheme. Finally, hiding N
encrypted audio in N cover images with chaos system process. The result shows
that the algorithm for audio encryption have a high degree of confidence, large
key space reached more than 2672 possible of a key, key sensitivity, and high
quality of recovered digital audio. Chaos system and secret sharing process
with multi-cover images offers additional space, security for the secret audio
message, and quality for cover images. The power signal to noise ratio of cover
images reached to 57db with embedding 334 KB of secret audio with four cover
images.
https://ijccce.uotechnology.edu.iq/article_133961_24e88a3db9983c11cfc0b7242db5ea84.pdf
2017-12-28
59
70
Lorenz chaotic map
Audio cryptography
Steganography
Secret Sharing Scheme
Encryptio
Dycryption
Mahmood
Z. Abdullah
1
AUTHOR
Zinah
J. Khaleefah
2
AUTHOR
ORIGINAL_ARTICLE
Design of a Continuous Sliding Mode Controller for Path Tracking of an Articulated Vehicle
This article presents design and evaluation of a sliding mode control scheme,
being applied to the case of an articulated vehicle. The proposed Sliding Mode Controller
(SMC) is based on a continuous sliding surface, being introduced for reducing the
chattering phenomenon, while achieving a better tracking performance and a fast
minimization of the corresponding tracking error. The derivation of the sliding mode
controller relies on the fully nonlinear kinematic model of the articulated vehicle, while the
overall stability of the control scheme is proven based on the Lyapunovs stability condition.
The performance of the established control scheme is evaluated through circle path
tracking scenario on a small-scale articulated vehicle
https://ijccce.uotechnology.edu.iq/article_133962_a14d72a39153078c7266898b94208bd4.pdf
2017-12-28
71
82
Sliding mode control
path planning
Thaker
Mahmood Nayl
1
AUTHOR