Sarah M. Taleb; Makram A. Fakhri; Salah Aldeen Adnan
Volume 20, Issue 1 , January 2020, , Page 16-23
Abstract
Lithium niobate (LiNbO3) nanostructure thin film was prepared and deposited on the substrates made of quartz by utilizing pulse laser deposition (PLD) technique. The effect of substrate temperature changing on the optical and structural properties of LiNbO3 films was investigated and studied. The chemical ...
Read More ...
Lithium niobate (LiNbO3) nanostructure thin film was prepared and deposited on the substrates made of quartz by utilizing pulse laser deposition (PLD) technique. The effect of substrate temperature changing on the optical and structural properties of LiNbO3 films was investigated and studied. The chemical mixture was prepared by mixing the raw material (Li2CO3, Nb2O5) with Ethanol liquid without any further purification, at the stirrer time 3hrs without heating, then the formed material was overexposed to annealing process at 1000°C for 4hrs. LiNbO3 nanostructure thin film was characterized and analyzed by utilizing the Ultra-Violet visible (UV-vis) and X-Ray Diffraction (XRD). The UV-vis results showed that the increase in the substrate temperature to 300°C leads to decrease in the values of transmission (T%), absorption (A) and optical energy gap (Eg) and increase in the values of reflection (R%) and refractive index (n). While, the XRD results explained that the LiNbO3 structure became more pure and crystalline with increase the substrate temperature, because the intensity of the phase 2θ at the value of 34.8°, 40.06° and 48.48° correspond to (110), (113) and (024) planes disappeared at the substrate temperature 300°C. So, all presented results give a good indication to use LiNbO3 nanostructure thin film prepared at the substrate temperature 300°C for manufacturing the optical waveguide to give the best results
Marwa Abdullatif Abdelaziz; Ayman Salman
Volume 20, Issue 3 , July 2020, , Page 16-28
Abstract
Generally, there is no single aspect of the human life that hasn't been touched through technology. The evolution of technology combines those aspects of technology with modern uses. In this scenario, the electronics of the appliance play a vital role in our life day after day. There are several technologies ...
Read More ...
Generally, there is no single aspect of the human life that hasn't been touched through technology. The evolution of technology combines those aspects of technology with modern uses. In this scenario, the electronics of the appliance play a vital role in our life day after day. There are several technologies like IoT Internet of Things, the cloud computing, robotics system, sensors and system on the chips which have revolutionized our technological progress. "IoT" is a vision, which is the biggest development technological technique. There are several platforms of IoT for services developers. A great number of potential platforms choose the most convenient way to perform a specific service. Therefore, developers chose the three of these models which are (blynk), (freeboard) and (dweet.io) to build this system. The proposed system is the Internet of Robotic Monitoring Things (IoRMT), which was employed to monitor the server room in a government security agency, using a set of sensors placed on the car robot. The sensors were connected with ESP8266NodeMCU microcontroller to display the value of sensors in the dashboard of freeboard platform. The car robot was controlled by software joystick using the blynk IoT platform as the mobile android application. The platform IoT dweet.io and platform IoT freeboard.io services and developers from Bug Lab's proved their ability to take data from device and produce it actionable rapidly.
Mohammed A. Hussein1; Ala'a. H. Ali; Ali K. Nahar3
Volume 21, Issue 1 , March 2021, , Page 16-30
Abstract
The technology has been growing rapidly in the form of portable wireless devices that can perform multiple functions to cope with the state-of-the-art technology and synchronization. A total device capacity must be increased to accommodate new wireless applications. This can be achieved by leveraging ...
Read More ...
The technology has been growing rapidly in the form of portable wireless devices that can perform multiple functions to cope with the state-of-the-art technology and synchronization. A total device capacity must be increased to accommodate new wireless applications. This can be achieved by leveraging new technologies, with higher data rates. Spectrum pooling has gained immense popularity, with increased demand for frequency range and bandwidth availability constraints. Statistics suggest that much of the spectrum licensed is not used all the time. Because of the transmitter's nonlinearity nature, the large (peak to average power ratio (PAPR)) phenomenon is a drawback in orthogonal frequency division multiplexing (OFDM). Several hybrid approaches have recently been implemented to minimize PAPR's high value, at the expense of increasing the level of computational complexity in the system. In this paper, a new hybrid approach has been introduced in parallel to combine the selective mapping approach (SLM) with the partial transmit sequence (PTS) approach to improve the efficiency of PAPR reduction with lower numerical method complexity. The findings reveal that the OFDM systems with the proposed hybrid approach have better efficiency in terms of PAPR elimination, side-information, and computational complexity compared to current hybrid methods. Also, a hybrid approach proposed output could be maintained without degradation.
Sarah M. Al-sudany; .Ahmed S. Al-Araji1; Bassam M. Saeed
Volume 21, Issue 2 , June 2021, , Page 16-35
Abstract
This research presents a study for multicore Reduced Instruction SetComputer (RISC) processor implemented on the Field Programmable GateArray(FPGA).The Microprocessor without- Interlocked Pipeline Stages (MIPS)processor is designed for the implementation of educational purposes, as well as it isexpected ...
Read More ...
This research presents a study for multicore Reduced Instruction SetComputer (RISC) processor implemented on the Field Programmable GateArray(FPGA).The Microprocessor without- Interlocked Pipeline Stages (MIPS)processor is designed for the implementation of educational purposes, as well as it isexpected that this prototype of processor will be used for multimedia or big dataapplications. 32- bit MIPS processor was designed by using Very High speed HardwareDescription Language (VHDL). Pipelined MIPS processor contains three parts that are :data path 32-bit MIPS pipeline, control unit, and hazard unit. The single cycle MIPSsystem was subdivided into five pipeline stages to achieve the pipeline MIPS processor.The five parts include: instruction fetch (IF), Instruction Decode (ID), execution (EXE),memory (MEM) and Write Back (WB). Three types of hazard: data hazard , controlhazard and strctural hazard are resolved. Certain components in the pipelined stage forthe design processor were iterated for four core SIMD pipelined processors. The MIPS isdeveloped using Xilinx ISE 14.7 design suite. The designed processor was implementedsuccessfully on Xilinx Virtex-6 XC6VLX240T-1FFG1156 FPGA. The total poweranalysis of multi-core MIPS processor is obtanined 3.422 watt and the clock period was7.329 ns (frequency: 136.444MHz).
Hazem I. Ali; Mustafa J. Kadhim
Volume 18, Issue 2 , September 2018, , Page 17-29
Abstract
The design of an H2 sliding mode controller for a mobile invertedpendulum system is proposed in this paper. This controller is conducted to stabilizethe mobile inverted pendulum in the upright position and drive the system to adesired position. Lagrangian approach is used to develop the mathematical ...
Read More ...
The design of an H2 sliding mode controller for a mobile invertedpendulum system is proposed in this paper. This controller is conducted to stabilizethe mobile inverted pendulum in the upright position and drive the system to adesired position. Lagrangian approach is used to develop the mathematical modelof the system. The H2 controller is combined with the sliding mode control to give abetter performance compared to the case of using each of the above controllersalone. The results show that the proposed controller can stabilize the system anddrive the output to a given desired input. Furthermore, variations in systemparameters and disturbance are considered to illustrate the robustness of theproposed controller.
Alaa Al-Obaidi; Satea H. Alnajjar; Mohamed Nsai; Hassan Sharabaty
Volume 20, Issue 2 , April 2020, , Page 14-22
Abstract
Electrocardiogram (ECG) examination via computer techniques that involve feature extraction, pre-processing and post-processing was implemented due to its significant advantages. Extracting ECG signal standard features that requires high processing operation level was the main focusing point for many ...
Read More ...
Electrocardiogram (ECG) examination via computer techniques that involve feature extraction, pre-processing and post-processing was implemented due to its significant advantages. Extracting ECG signal standard features that requires high processing operation level was the main focusing point for many studies. In this paper, up to 6 different ECG signal classes are accurately predicted in the absence of ECG feature extraction. The corner stone of the proposed technique in this paper is the Linear predictive coding (LPC) technique that regress and normalize the signal during the pre-processing phase. Prior to the feature extraction using Wavelet energy (WE), a direct Wavelet transform (DWT) is implemented that converted ECG signal to frequency domain. In addition, the dataset was divided into two parts , one for training and the other for testing purposes Which have been classified in this proposed algorithm using support vector machine (SVM). Moreover, using MIT AI2 Companion was developed by MIT Center for Mobile Learning, the classification result was shared to the patient mobile phone that can call the ambulance and send the location in case of serious emergency. Finally, the confusion matrix values are used to measure the proposed classification performance. For 6 different ECG classes, an accuracy ration of about 98.15% was recorded. This ratio became 100% for 3 ECG signal classes and decreases to 97.95% by increasing ECG signal to 7 classes.
Mohammed Y. Hassan; Ahmed Abduljabbar Mahmood
Volume 19, Issue 2 , April 2019, , Page 18-29
Abstract
The design and simulation of the Spiking Neural Network (SNN) areproposed in this paper to control a plant without and with load. The proposedcontroller is performed using Spike Response Model. SNNs are more powerfulthan conventional artificial neural networks since they use fewer nodes to solvethe same ...
Read More ...
The design and simulation of the Spiking Neural Network (SNN) areproposed in this paper to control a plant without and with load. The proposedcontroller is performed using Spike Response Model. SNNs are more powerfulthan conventional artificial neural networks since they use fewer nodes to solvethe same problem. The proposed controller is implemented using SNN to workwith different structures as P, PI, PD or PID like to control linear andnonlinear models. This controller is designed in discrete form and has threeinputs (error, integral of error and derivative of error) and has one output. Thetype of controller, number of hidden nodes, and number of synapses are setusing external inputs. Sampling time is set according to the controlled model.Social-Spider Optimization algorithm is applied for learning the weights of theSNN layers. The proposed controller is tested with different linear andnonlinear models and different reference signals. Simulation results proved theefficiency of the suggested controller to reach accurate responses with minimumMean Squared Error, small structure and minimum number of epochs under noload and load conditions.
Nihad M. Ameen; Ammar S. Muhammed
Volume 19, Issue 1 , January 2019, , Page 20-27
Abstract
In this paper vector control with variable frequency drive used toapply speed control of a three-phase AC Asynchronous and induction machines.The flux and torque references used to obtain the current components.Proportional-Integral controllers are used to keeping the measured currentcomponents at their ...
Read More ...
In this paper vector control with variable frequency drive used toapply speed control of a three-phase AC Asynchronous and induction machines.The flux and torque references used to obtain the current components.Proportional-Integral controllers are used to keeping the measured currentcomponents at their reference values. The stator voltage references are theoutput of the PI current controllers. High-performance with the smoothoperation is obtained using the proposed method. The differences can be seen inbehavior dynamic state. When the motor is rotating at full speed with a fullload,it reaches good current waveforms very easily due to the independent PIcontrol of torque and magnitude of flux. In high and sudden variations of thereference input, the direct command is more efficient and less demanding forthe equipment. The expressions of the fundamental variables (speed, torque,flux) and equivalent phase circuit of the machine will be reviewed.
Sama Hussam Sabah Sabah; Muayad Sadik Croock
Volume 20, Issue 4 , October 2020, , Page 21-28
Abstract
The management of faults in Wireless Sensor Networks (WSN) has been considered recently. The problem of tolerating the detected fault is solved by presenting different methods from numerous researchers. Moreover, the software engineering approaches have been adopted to introduce methods with high reliability. ...
Read More ...
The management of faults in Wireless Sensor Networks (WSN) has been considered recently. The problem of tolerating the detected fault is solved by presenting different methods from numerous researchers. Moreover, the software engineering approaches have been adopted to introduce methods with high reliability. In this paper, a fault tolerance method is proposed for WSN based on the software engineering self-checking process to deal with the faults that affect energy consumption in the network and make it drop earlier. The proposed method detects the appeared fault at any sensor node and recovers the faulted readings by computing the average value of its neighbor nodes. In addition, this process is continued until the faulty sensor is fixed by the maintenance team. The proposed method is tested over different case studies and the obtained results prove the claim of the paper's idea.
Mutaz Haqi Ismael; Abeer MaoLood
Abstract
The automation of medical systems is one of the most important topics and that takes the highest priority in our time due to the COVID-19 pandemic, which has caused human disasters without knowing the exact diagnosis of patients and other diseases. Therefore, it has been recently started to rely on sensors ...
Read More ...
The automation of medical systems is one of the most important topics and that takes the highest priority in our time due to the COVID-19 pandemic, which has caused human disasters without knowing the exact diagnosis of patients and other diseases. Therefore, it has been recently started to rely on sensors to support medical results and monitor the patient throughout the day, and this in itself is an application of Internet of Things (IoT) which is called Internet of Medical Things (IoMT). The expansion and reliability of this type of systems need to secure the systems, infrastructure, devices and used sensors. This paper focuses on the proposal key to encrypt the data stored in the database by relying on artificial intelligence algorithms and Bezier curves based on the dynamic number generated in the medical platform as an input to it. The Particle Swarm Optimization (PSO) algorithm was chosen because it is fast to implement and to support limited devices within the used network. Also, the logistic map function was used to generate the randomness of the generated key. The proposed key has also been examined and it has passed the five randomness tests and succeeded in 13 out of 16 tests within the NIST tests.
Computer
Safa S. Abdul-Jabbar; Alaa K. Farhan; Rana F. Ghani
Abstract
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships ...
Read More ...
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and exploring how specific features of this new technology may transform traditional business methods. The primary objectives of this study are to summarize the significant Blockchain techniques used thus far, identify current challenges and barriers in this field, determine the limitations of each paper that could be used for future development, and assess the extent to which Blockchain and data analytics have been effectively used to evaluate performance objectively. Moreover, we aim to identify potential future research paths and suggest new criteria in this burgeoning discipline through our review.
Shahad Nafea; Ekhlas Kadum Hamza
Volume 20, Issue 1 , January 2020, , Page 24-30
Abstract
The most necessary factors effect on the standard of broadband access services in mobile systems are WIMAX signal throughput and area coverage range. The environment controls are based on the sign power of any radio communication system. The sign power in any base station site relies on the space between ...
Read More ...
The most necessary factors effect on the standard of broadband access services in mobile systems are WIMAX signal throughput and area coverage range. The environment controls are based on the sign power of any radio communication system. The sign power in any base station site relies on the space between the transmitter and the receiver, carrier frequency for the transmitter and the receiver along on the path loss. One of the most generally utilized experimental model to predict the path loss is the COST-231 Hata model. In this paper, the path loss rates have calculated based on the WIMAX criterion frequency at an area with 3.5GHz, that constant distances (7km) of transmitting base station into receive base station in urban, suburban environments. The execution of the COST-231 Hata paradigm and optimized paradigm are rated over the path loss. This model is optimized using Genetic Algorithm Technique using a computational tool MATLAB. Path loss results acquired show that the optimized paradigm rates a little higher than rates standard. The distance (7km)is good because of achieving the lowest value for path loss.
Sabreen J. Siwan; Waleed Fawwaz Shareef; Ahmed Nasser
Abstract
Petroleum is the economic infrastructure in Iraq because it generates a significant portion of the country's revenue and can be considered as the primary source of financial costs each year. As a consequence, it is critical to protect the sector and continue to develop it. Therefore, it is important ...
Read More ...
Petroleum is the economic infrastructure in Iraq because it generates a significant portion of the country's revenue and can be considered as the primary source of financial costs each year. As a consequence, it is critical to protect the sector and continue to develop it. Therefore, it is important to track and maintain pipelines regularly to detect defects on time. In pipeline monitor and control, the advent of the Internet of Things (IoT) technology and the deployment of embedded sensing systems enable successful pipeline maintenance with the simple requirement for real-time precise measurements. In this paper, a wireless network based on an IoT system and integrated with cloud service is proposed for structure monitoring of oil pipelines, to detect the risks on the structure such as tampering and/or wear and tear effects. The method is based on collecting data from a sensor node equipped with an RF module attached to the pipeline structure. These nodes collectively form a network of IoT devices connected to the cloud server. The raw data is collected, stored, and statistically analyzed to be accessible by the user anytime and anywhere through the Internet. The performance of the system is evaluated in different cases, including the distance about the node to detect events on the pipe and to discriminate the distance of event to determine the location the event it was tested by using four different states of the transmitted data.
Computer
Zeina Abdullah Humadi; Qusay Fadhel Al-Doori
Abstract
Communication and computing systems have made it easier for the world to transfer data and information from the sender to the recipient at the lowest cost and most efficiency. The transmission process may cause data corruption or error for many reasons, including the environment, the large volume of ...
Read More ...
Communication and computing systems have made it easier for the world to transfer data and information from the sender to the recipient at the lowest cost and most efficiency. The transmission process may cause data corruption or error for many reasons, including the environment, the large volume of transmitted data, heat, and noise. for these Reasons, There is a need to correct and treat these errors. Individual errors can be easily corrected by hamming code, while burst errors cannot be corrected easily and need a hardware device called the interleaver used to correct the burst error. In this research, the different types of interleaver are studied and compared to find the best interleaver in order to increase the efficiency and accuracy of the systems. The issue is that interleaving takes a long time, which increases the turbo code's overall execution time. Our goal is to create an interleaver that is more sensitive and efficient than other varieties.
Computer
Ahmed Abdul Karim Talib; Aymen Dawood Salman
Volume 22, Issue 3 , September 2022, , Page 25-33
Abstract
Traditional identification techniques for electronic payments, such as the Personal Identification Number (PIN), are becoming outdated and unsafe, while mobile payments are becoming more popular and widely used. It presents a risk to issuers since there is no reliable consumer verification method available, ...
Read More ...
Traditional identification techniques for electronic payments, such as the Personal Identification Number (PIN), are becoming outdated and unsafe, while mobile payments are becoming more popular and widely used. It presents a risk to issuers since there is no reliable consumer verification method available, and the lack of safe and reliable e-payment systems is one of the key issues restricting progress. As a result, efforts have been made to develop and maintain a unified payment system that is well-organized, efficient, dependable, and secure. This system avoids the need for physical cash while also still satisfying all payment and identification requirements, a safe and trustworthy method is required for the country's successful adoption of an e-payment system. This article focuses on the future of online payment and the security problems through using effective biometric authentication technologies to provide a trustworthy authentication method for an e-payment system.
Jabbar Salman; Thamir Rashed Saeed; Alaa Hussein Ali
Volume 18, Issue 3 , December 2018, , Page 26-32
Abstract
The recognition and classification of languages represent a vital factor in thecomputer interaction. This paper presents Arabic Sign Language recognition, which isrepresented as an appealing application. The work in this paper is based on three steps;preprocessing, feature extraction and classification ...
Read More ...
The recognition and classification of languages represent a vital factor in thecomputer interaction. This paper presents Arabic Sign Language recognition, which isrepresented as an appealing application. The work in this paper is based on three steps;preprocessing, feature extraction and classification (Recognition). The statistical featureshave been used than the physical features, while Multilayer feed-forward neural networkas classification methods. The recognition percent is 96.33% has been gained over-performthe earlier works. The simulation has been made by using Matlab 2015b.
Computer
Mohanad A. Mohammed; Hala B. Abdul Wahab
Abstract
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and ...
Read More ...
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and outcomes from this conversion. An encryption scheme homomorphic technique (HE) is a method that encrypts the cipher data without the need to decrypt it,paillier encryption method is used. This paper aims to propose a system that integrates Paillier cryptosystem homomorphic technology with IoT and lightweight blockchain technology to provide decentralization to the IoT environment and improve security. The proposed system results in improving the IoT device’s work environment by solving the main challenges of security using blockchain, privacy using homomorphism, and data volume using blockchain. The data set used to implement and evaluate the proposed system is industrial internet of things data The dataset used in this paper is generated via machine industry 4.0 Storage System status which represents the system failure and work status. this system is evaluated using standard metrics used to evaluate the blockchain effectiveness and time, resources consumed and shows better results in time and power consumption.
Computer
Muna Ghazi; Matheel Abdulmunim
Abstract
Text summarization can be utilized for variety type of purposes; one of them for summary lecture file. A long document expended long time and large capacity. Since it may contain duplicated information, more over, irrelevant details that take long period to access relevant information. Summarization ...
Read More ...
Text summarization can be utilized for variety type of purposes; one of them for summary lecture file. A long document expended long time and large capacity. Since it may contain duplicated information, more over, irrelevant details that take long period to access relevant information. Summarization is a technique which provides the primary points of the whole document, and in the same time it will indicates the majority of the information in a small amount of time. For this reason it can save user time, decrease storage, and increase transfer speed to transmit through the internet. The summarization process will eliminate duplicated data, unimportant information, and also replace complex expression with simpler expression. The proposed method is using convolutional recurrent neural network deep model as a method for abstractive text summarization of lecture file that will be great helpful to students to address lecture notes. This method proposes a novel encoder-decoder deep model including two deep model networks which are convolutional and recurrent. The encoder part which consists of two convolutional layers followed by three recurrent layers of type bidirectional long short term memory. The decoder part which consists of one recurrent layer of type long short term memory. And also using attention mechanism layer. The proposed method training using standard CNN/Daily Mail dataset that achieved 92.90% accuracy.
Computer
Shaymaa Mahmood Naser; Yossra Hussain Ali
Abstract
Cybersecurity systems have been taken into account in modern information systems and methods. This is due to the increase in electronic attacks on storage information in terms of transmission, reception and storage. Therefore, the need to produce such systems in a complete way to prevent their penetration ...
Read More ...
Cybersecurity systems have been taken into account in modern information systems and methods. This is due to the increase in electronic attacks on storage information in terms of transmission, reception and storage. Therefore, the need to produce such systems in a complete way to prevent their penetration into the network has increased. In addition, artificial intelligence (AI) methods are used in cybersecurity systems as classifiers, attack detectors, and components for predicting threats that surround the network. This requires more information about threats and vulnerabilities to be covered to avoid any errors. In this paper, a systematic review is conducted to cover cybersecurity used in various applications, including systems based on wireless, cloud, and mobile sensor networks (WSN). The systematic review approach is adopted on a two-way basis to produce a clear view of the research work to date and to provide a field that can be used for future work.
Luay Thamir Rasheed
Volume 20, Issue 3 , July 2020, , Page 29-41
Abstract
This paper presents the design of an optimal Linear Quadratic Regulator (LQR) controller using Ant Colony Optimization (ACO) and particle swarm optimization (PSO) methods for position control of a permanent magnet DC (PMDC) motor. In this work, Ant Colony control and particle swarm control algorithms ...
Read More ...
This paper presents the design of an optimal Linear Quadratic Regulator (LQR) controller using Ant Colony Optimization (ACO) and particle swarm optimization (PSO) methods for position control of a permanent magnet DC (PMDC) motor. In this work, Ant Colony control and particle swarm control algorithms have been utilized to set the optimal elements of the weighting matrices subjected to a proposed cost function. The proposed cost function is a combination of the quadratic performance index and integral square error. The proposed design can overcome the difficulty in setting the weighting matrices with the suitable elements. The simulation results using (Matlab Package) show that the optimal LQR controller using ACO algorithm can give excellent performance in terms of obtaining smooth and unsaturated state voltage control action that will stabilize the DC motor system performance and minimize the position tracking error of the system output. In addition, the rising time and settling time is decreased in comparison with the LQR based PSO controller performance.
Zainab Mohammed Muneef; Hala bahjat; Abdulmohsen Jaber Abdulhoseen
Abstract
With the increasing use of media in communications, both academia and industry pay attention to the content security of digital images. This research presents a Homomorphic cryptosystem-based asymmetric picture encryption technique (Paillier). The algorithm is used for securing images that transmit over ...
Read More ...
With the increasing use of media in communications, both academia and industry pay attention to the content security of digital images. This research presents a Homomorphic cryptosystem-based asymmetric picture encryption technique (Paillier). The algorithm is used for securing images that transmit over public unsecured channels. The Homomorphic property is used in this paper, which is comprised of three steps: key generation, encryption, and decryption. To realize such approach, the encryption cryptosystem must support additional operation over encrypted data. This cryptosystem can be effective in protecting images and supporting the construction of programs that can process encrypted input and produce encrypted output.
Mohammed Rajih Jassim
Volume 18, Issue 2 , September 2018, , Page 30-38
Abstract
In this paper, the limitation of the existing E-Government system ishighlighted, followed by the introduction of the new e-service framework that handlesthe e-government system in the offline mode. This framework can manage complaintsand transactions in an effective manner. The current study is significant ...
Read More ...
In this paper, the limitation of the existing E-Government system ishighlighted, followed by the introduction of the new e-service framework that handlesthe e-government system in the offline mode. This framework can manage complaintsand transactions in an effective manner. The current study is significant since anunbiased assessment of the loopholes was conducted in accordance with theinformation security guidelines. Furthermore, all possible vulnerabilities of the systemwere assessed to evaluate the actual impacts of the information security guidelines.Some suggestions have been recommended to improve the information security of Egovernancesystems for Martyrs and Wounded of Popular Mobilization Forces andIraqi Militaries. Nevertheless, the current project framework has been adopted from therelevant research works performed earlier. The framework design involves two stages:(1) design of a flexible website for Martyrs and Wounded of Popular MobilizationForces and Iraqi Militaries. In other words, we would like to provide a robust egovernmentservice to Iraqi government; and (2) improve system security and preventman-in-the-middle (MiMT) attack. The significance of this study is to reduce the claimprocessing time for the martyrs and wounded of popular mobilization forces and Iraqmilitary. Furthermore, it will increase the reply time from the departments and theclients to reply for their inquiries.
Raghad hani1; Ayad Z. Mohammed; Bushra R. Mahdi3
Volume 21, Issue 1 , March 2021, , Page 31-37
Abstract
X-ray is electromagnetic wave pass through all human tissue and show tissue image by black and white, and the explosion for x ray in short treatment may cause cancer, Photonic crystal fiber used as detector for x- ray approximate effective radiation dose for human bone for spine x- ray 1.5 mSv which ...
Read More ...
X-ray is electromagnetic wave pass through all human tissue and show tissue image by black and white, and the explosion for x ray in short treatment may cause cancer, Photonic crystal fiber used as detector for x- ray approximate effective radiation dose for human bone for spine x- ray 1.5 mSv which need 6month to repeat the exposure and extremity (foot, hand and etc.) x-ray 0.001 mSv need to 3 hours to repeat exposure , the change in x ray dose can be detected by measuring the change in wavelength shifting of laser 450nm which pass through photonic crystal fiber and effected by the emission of x-ray to record the small change in x-ray dose and save the human from radiation and this sensor is small compact and easy to use and have high sensitivity for x -ray used to measure the bone x-ray as its value lower than other x-ray used in others tissue.
Mahmoud M. Mahmoud; Ahmed R. Nasser
Volume 21, Issue 2 , June 2021, , Page 36-43
Abstract
Object detection of autonomous vehicles presents a big challenge forresearchers due to the requirements of accuracy and precision in real-time.This work presents a deep learning approach based on a dual architecturedesign of the network. A highly accurate multi-class network of convolutionalneural networks ...
Read More ...
Object detection of autonomous vehicles presents a big challenge forresearchers due to the requirements of accuracy and precision in real-time.This work presents a deep learning approach based on a dual architecturedesign of the network. A highly accurate multi-class network of convolutionalneural networks (CNN) is presented for input data classification. A Region-Based Convolutional Neural Networks (Faster R-CNN) network with a modifiedFeature Pyramid Networks (FPN) is used for better detection of tiny objects andYou Only Look Once (YOLOv3) network is used for general detection. Eachnetwork independently detects the existence of an object. The decision maps arethen fused and compared to decide whether an object is present or not. FasterR-CNN with FPN model reported a higher intersection over Union (IoU) andmean average precision (mAP) than the YOLOv3. This approach is reliabledemonstrating an upgrade on the existing state-of-the-art methods of fullyconnected networks.
Hussein Ali Aldelfy; Mahmood Hamza Al-Mufraji; Thamir R. Saeed
Volume 20, Issue 2 , April 2020, , Page 23-32
Abstract
Sign language is the basic way to communicate and understand ideas among people with disabilities, deaf and dumb, and to recognize and understand the meanings of the motions and the gestures used by them that requires knowledge of certain features such as hand position, form, motion, directions and facial ...
Read More ...
Sign language is the basic way to communicate and understand ideas among people with disabilities, deaf and dumb, and to recognize and understand the meanings of the motions and the gestures used by them that requires knowledge of certain features such as hand position, form, motion, directions and facial expressions. Moreover, the extraction of image features is important and it plays a vital role in further analysis of image processing. Extracting the special features of the isolated Arabic sign language (ArSL) words based on Discrete Cosine Transform (DCT) was proposed in current paper. By monitoring and tracking the trajectory of the hands when single hand movement or double hands extract the required features. That is the independent sign language word features vector is incorporated as an input into the classification stage to derive the meaning of the word as voice or text. The research data were collected in cooperation with the Ministry of Labor and Social Affairs of Iraq with the assistance of the Special Needs Department and up to 40 words of isolated sign language collected. Two signs were taken as examples of feature extraction (Happy and water). Since the word happy gives an example of a sign word performed by two hands, on the other hand, the word water is performed with one hand, the Arabic sign language contains different words, part of them are performed with one hand and the other part with both hands.