Computer
Emad M. Alsaedi; Alaa Kadhim Farhan
Abstract
Content-Based Image Retrieval (CBIR) is an actual application in computer vision, which retrieves similar images from a database. Deep Learning (DL) is essential in many applications, including image retrieval applications. However, encryption techniques are used to protect data privacy because these ...
Read More ...
Content-Based Image Retrieval (CBIR) is an actual application in computer vision, which retrieves similar images from a database. Deep Learning (DL) is essential in many applications, including image retrieval applications. However, encryption techniques are used to protect data privacy because these data are vulnerable to being viewed by unauthorized parties while being transmitted over unsecured channels. This paper includes two parts for images retrieval. In the first part, features of all images of a Canadian Institute for Advanced Research CIFAR-10 dataset were extracted and stored on the Server-side. In the second part, the Brakerski/Fan-Vercauteren (BFV) homomorphic encryption scheme method for encrypting an image sent by the client-side. First, their decryption and image features are extracted depending on the trainer model when they arrive on the server-side. Then an extracted features are compared with stored features using the Cosine Distance method, and then the server encrypts the retrieved images and sends them to the client-side. Deep-learning results on plain images were 97% for classification and 96.7% for retriever images. At the same time, TheNational Institute of Standards and Technology (NIST ) test was used to check the security of BFV when applied to CIFAR-10 dataset.
Computer
Dhuha Abd Almoanf; Shaimaa H. Shaker
Abstract
Computed tomography (CT) is used to diagnose diseases and tumors. A special dye called contrast material is used in CT scans to assist emphasize the parts of the body being examined. Therefore, an enhancement technique to improve CT images' degradation is needed. This paper aims to present a method to ...
Read More ...
Computed tomography (CT) is used to diagnose diseases and tumors. A special dye called contrast material is used in CT scans to assist emphasize the parts of the body being examined. Therefore, an enhancement technique to improve CT images' degradation is needed. This paper aims to present a method to enhance the quality of Ct-Scan images based on discrete wavelets transform and the Retinex algorithm. The proposed methods are based on the Retinex algorithm parameters or Dark Channel Prior algorithm parameters, according to the output image from preprocessing and discrete wavelets algorithm steps to increase the lightness degree of an image, remove possible noise from the image improve the contrast. The results of experiments of the enhanced image outputted from the Retinex model compared with one outputted from the Dark Channel Prior method. Hence, image quality based on the DCP method is a higher degree of enhanced rate and reasonable rate of noise removal-based enhancement measures, which were SI, MSE, IQI, SNR, and SNR, but was very attentive to the percentage values of IQI and SI. So the DCP with WT was recorded as the highest rate of enhancement.
Wajdi T. Joudah Al-Rubaye; Ah med Al-Araji1; Hayder A. Dhahad
Volume 20, Issue 3 , July 2020, , Page 50-64
Abstract
This paper proposes an off-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. The aim of this research is to obtain the best hydrogen partial pressure (PH2) value using FPGA ...
Read More ...
This paper proposes an off-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. The aim of this research is to obtain the best hydrogen partial pressure (PH2) value using FPGA emulator to design and implement a digital PID controller that track the fuel cell output voltage during a variable load current applied. The off-line Particle Swarm Optimization (PSO) algorithm is used for finding and tuning the optimal value of the digital PID controller parameters that improve the dynamic behavior of the closed loop digital control fuel cell system and to achieve the stability of the desired output voltage of fuel cell. The numerical simulation results (MATLAB) package and FPGA emulator experimental work show the performance of the proposed FPGA-PID controller in terms of voltage error reduction and generating optimal value of the (PH2) control action without oscillation in the output and no saturation state when these results are compared with other control methodology.
Rawaa Ammar Razooqi; hassan Jaleel; Gaida Muttasher
Abstract
The Savvy Manufacturing plant could be a concept that communicates the conclusion goal of fabricating digitization. A Smart Factory, within the most common sense, profoundly digitized shop floor that collects and offers information persistently through associated computers, gadgets, and generations. ...
Read More ...
The Savvy Manufacturing plant could be a concept that communicates the conclusion goal of fabricating digitization. A Smart Factory, within the most common sense, profoundly digitized shop floor that collects and offers information persistently through associated computers, gadgets, and generations. In this work, the factory is represented by five types of sensors. The reading of the sensor values is sent to one of the Edge servers and cloud computing. One Edge server is selected based on calculating the time it takes for each server. The highest least time priority is chosen to receive the data coming from the sensors. This paper suggests a way to reduce the delay by using the edge server in addition to cloud computing by using methods that overcome any malfunction in one of the servers via another one that can work without the need to stop the factory systems.
Control
Bashar F. Midhat
Abstract
In most applications, electric drives are actuated using on/off devices due to their low cost and also due to the relatively high power consumption of the electric drives which make applying linear power amplifiers very costly. In this paper, the operation of PMDC motors under discontinuous control action ...
Read More ...
In most applications, electric drives are actuated using on/off devices due to their low cost and also due to the relatively high power consumption of the electric drives which make applying linear power amplifiers very costly. In this paper, the operation of PMDC motors under discontinuous control action is analyzed. In addition, to reduce chattering, boundary layer solution has been addressed. Both suggested control techniques have been applied to a PMDC motor model in a software simulation using MATLAB. The results show better performance of boundary layer technique due to the reduced chattering.
Nasheed F. Mossa; Waleed F. Shareef; Faez F. Shareef
Volume 18, Issue 2 , September 2018, , Page 53-62
Abstract
The oil export industry dominates the economy of the world and itdepends heavily on oil pipelines. Exposed pipelines are prone to malfunctioningdue to intentional or unintentional tampering and vandalism, which is usuallycaused by damaging form of either knocking or drilling. Continuous structurehealth ...
Read More ...
The oil export industry dominates the economy of the world and itdepends heavily on oil pipelines. Exposed pipelines are prone to malfunctioningdue to intentional or unintentional tampering and vandalism, which is usuallycaused by damaging form of either knocking or drilling. Continuous structurehealth monitoring (SHM) of pipelines using conventional methods is difficultand expensive due to the extensive length of the pipelines and the harshenvironment. Recent development in printed electronic circuits andmicrocontrollers open new possibilities in the field of monitoring and haveproven their practicality in vibration monitoring process. This paper presents amonitoring system for pipeline heal of the structure based on the wirelesssensor network. The system senses the pipeline vibration and relays the data toa base station for the procession. A WSN consists of three nodes is designed andimplemented. Each node is built around 32-bit ARM core microcontroller, andequipped with an accelerometer to measure the pipeline vibration. Themeasurements of each sensor are collected wirelessly through ZigBee protocolto a base station. Results on a 2 m pipeline sample show the ability of thesystem to precisely detect damaging events e.g. knocking and drilling to thepipeline.
Dhuha Dheyaa Khudhur; Muayad Sadik Croock
Volume 21, Issue 1 , March 2021, , Page 53-61
Abstract
It is well known that the Wireless Sensor Network (WSN) is a part of different fields of modern life (self-managing life). The automation of operating the WSN without any need for human efforts develops the technique used in this network in terms of power consumption, costs, and so on. In this paper, ...
Read More ...
It is well known that the Wireless Sensor Network (WSN) is a part of different fields of modern life (self-managing life). The automation of operating the WSN without any need for human efforts develops the technique used in this network in terms of power consumption, costs, and so on. In this paper, the WSN application that adopts the self-managing property is presented as well as applying this property in a greenhouse as a case study. It uses remote controlling technology for data exchanging in a multi-layer WSN. Different hardware and software equipment have been employed in the application based on self-managing techniques. Such hardware includes (NodeMCU ESP8266) as a microcontroller, Raspberry pi3 as a base station that captures the sensor reading from the node. Additionally, it was utilized two types of sensors (DS18B20, soil moisture) to sense the environmental parameters such as temperature and soil moisture and two actuators (LED1, LED2). The results show the proper performance of the presented WSN in terms of the self-managing side by checking the received data in real-time mode. These results are achieved for the threshold values of 25ᵒC temperature and 500 soil moisture as an upper level for operating the actuators.
Manahil Sherfi; TajElsir Hassan Suliman; NourEldien A. NourEldien
Abstract
Automatic Revocation means performing the revocation task automatically by the proxy Re-Encryption (PRE), without any command from the data owner. For the lack of survey studies that tackle the automatic Revocation Process, this paper demonstrates a rich survey on the recent auto-revocation schemes proposed ...
Read More ...
Automatic Revocation means performing the revocation task automatically by the proxy Re-Encryption (PRE), without any command from the data owner. For the lack of survey studies that tackle the automatic Revocation Process, this paper demonstrates a rich survey on the recent auto-revocation schemes proposed by the research community. To accomplish the survey, a literature review methodology, which includes seven steps, is followed. The study concluded with the following results: clarifying the concept of automatic revocation identifying the current proposed automatic revocation schemes, classifying the proposed automatic user revocation schemes, and presenting suggestions of future research directions for revocation schemes.
Computer
Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi
Abstract
Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ...
Read More ...
Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated in the area of information protection, helping to assure the validity of the information generated. These include the following algorithms: SHA-1, SHA-2, SHA-3, AES, RC5, RSA, and more. In order to secure the legitimacy of the information and monitoring data , the speed of encryption and authentication must be critical. . Due to the necessity of fast and secure algorithms, these features are required. In this work, modification of the SHA-3 algorithm by introducing a new function called (the keccak function), which has an extremely quick execution time and a high level of security, also versatile cryptographic function. This change is implemented via the 2D chaotic system, which is geared towards generating random values for constants for the SHA3 algorithm. These constants values are generated by the SHA3 algorithm, and so are random and unguessable by the intrude. Statistical tests conducted by the National Institute of Standards and Technology (NIST) effectively outperformed the randomness of a proposed approach .The proposed algorithm shows lower execution time compared to previous studies, which is 0.041616sec for 1MB.
Control
Aws M Abdullah; Farah F. Alkhalid; Ali Mohsin Kaittan
Abstract
The artificial intelligence techniques such as neural networks and fuzzy systems play an important role to disconnect flexion & expansion of the swing leg, the earth response force of the other foot has been redesigned. Underthat paper, we think the fuzzy controller plan issue for yield following ...
Read More ...
The artificial intelligence techniques such as neural networks and fuzzy systems play an important role to disconnect flexion & expansion of the swing leg, the earth response force of the other foot has been redesigned. Underthat paper, we think the fuzzy controller plan issue for yield following flawed genuine investigation of nonlinear systems. For examination, an essential fuzzy control plot has been bristly developed dependent on a current methodology delegate under the field.In this paper, the Feedforward Neural Network has been implemented with integer, fixed point and floating point data representations. Additionally, The Fuzzy Logic Controllers in both analog and digital forms has been implemented in hardware. Both designs use less hardware resources and operate with reasonable speed compared to other existing designs. The digital implementation of Fuzzy Logic Controller has been tested for a simulated first order liquid level process and the performance results have been compared with those of the Matlab version of Fuzzy Logic Controller. Here, Fuzzy Logic Controller is used as the controller and is trained adaptively for the changes in process parameters using recursive k-means clustering algorithm for updating the centers of the hidden layer and Recursive Least Square algorithm for updating the weights of the output layer, the result of the settling time about 20ms and takes 20 iterations, and the squared error reaches zero at approximately 20 µs
Computer
Asmaa Ibrahim Hussieen; Abeer Tariq MaoLood; Ekhlas Khalaf Gbash
Abstract
Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and ...
Read More ...
Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and theoretical fields, on the other hand, there is no perfect solution. To meet such objectives, the researchers strive for preserving cryptographic primitives when developing high-efficiency e-voting schemes. The concept of fog computing was developed to improve network infrastructure to satisfy the demands of large amounts of data the same time as also increasing the efficiency of the processing power. Also, it has been created as well to address concerns with Cloud computing, like the distribution environment complexity, real-time response, mobility, and IoT application location awareness. The concentration of this study was on a complete review regarding the systems of EVs through various scholars as a platform to detect flaws or problems in the deployment of extremely secure EV systems. In addition, nations having a history of EV system adoption were examined. A concept for future work on establishing a safe EV system depends on problems discovered in numerous works.
Areej Munadel Kadhum; Ekhlas Kadum Hamza
Volume 21, Issue 2 , June 2021, , Page 59-69
Abstract
with the introduction of new standards at a fast pace, wireless communicationis experiencing great development and growth, thereby raising the level of demand forradio spectrum. The spectrum, however, is a limited resource and cannot be subdividedindefinitely to satisfy any use. As a result, spectrum ...
Read More ...
with the introduction of new standards at a fast pace, wireless communicationis experiencing great development and growth, thereby raising the level of demand forradio spectrum. The spectrum, however, is a limited resource and cannot be subdividedindefinitely to satisfy any use. As a result, spectrum scarcity arises. This scarcityrepresents the main problem that faces the future of wireless networks. This scarcity isdue to the inefficient fixed spectrum allocation technique. The Dynamic Spectrum Access(DSA) is a successful solution to reduce the spectrum scarcity that wirelesscommunications currently face. DSA allows users without a spectrum license known asSecondary Users (SUs) to temporarily use the unused licensed spectrum. This workfocuses on analysis, and design of the Cognitive Radio (CR) system forOrthogonalFrequency Division Multiplexing modulation. The OFDM transceiver system has beenimplemented in the first stage using the Quadrature Phase Shift Keying (QPSK)modulation technique by Xilinx System Generator Inter-Symbol InterferenceSimulink(XSG) based on MATLAB. The second stage of the proposed system is to design energydetection of the OFDM transceiver. This system was analyzed under the Adaptive WhiteGaussian Noise (AWGN) channel based XSG. In this work, the energy detector is alsodesigned using the XSG ISE14.1 Simulink and obtained all the signals successfully.
Mohammed Moanes Ezzaldean; Qusay S. Kadhem
Volume 19, Issue 1 , January 2019, , Page 42-51
Abstract
This paper presents a design of a complete dual-loop controller for 4-switchbrushless dc motor. In low power, low-cost applications, the 4-switch inverter topology isa felicitous alternative of the ordinary 6-switch inverter. The controller of the 4-switchBLDC motor has to be uncomplicated and can be ...
Read More ...
This paper presents a design of a complete dual-loop controller for 4-switchbrushless dc motor. In low power, low-cost applications, the 4-switch inverter topology isa felicitous alternative of the ordinary 6-switch inverter. The controller of the 4-switchBLDC motor has to be uncomplicated and can be implemented without the use ofexpensive hardware to avoid increasing the overall cost of the drive system. Furthermore,the control must be able to deal with the known problems of the 4-switch drive which arespeed limitation and high ripple torque. The proposed controller comprises sliding modespeed control and direct current hysteresis control. To investigate the performance of theproposed design, the system is modeled by using Matlab/Simulink, the results areobtained for different working conditions. The propitious results certify the applicabilityof the proposed controller in low-cost 4-switch BLDC motor drive systems.
Shahad S. Husain; Jassim K. Hmood
Volume 20, Issue 2 , April 2020, , Page 47-57
Abstract
spatial division multiplexing (SDM) system has been considered as promising systems due to its ability to transport a higher bit rate for longer transmission distance. However, nonlinear phase noise (NPN (degrades SDM system performance. In this paper, we propose return-to-zero (RZ)-coded phase-conjugated ...
Read More ...
spatial division multiplexing (SDM) system has been considered as promising systems due to its ability to transport a higher bit rate for longer transmission distance. However, nonlinear phase noise (NPN (degrades SDM system performance. In this paper, we propose return-to-zero (RZ)-coded phase-conjugated twin waves (PCTWs) to improve the effectiveness of nonlinear distortion cancellation in the SDM system. In this approach, the PCTWs are modulated by m-array quadrature amplitude modulation (mQAM) then RZ encoded. After that, RZ-mQAM PCTWs are co-propagated over two fibres links. The received signals are superimposed to suppress the NPN. An analytical model that characterizes the performance of spatial-multiplexed (SM) RZ-coded PCTWs scheme is developed. Moreover, we numerically investigate the system performance with 4QAM format at 20Gsymbol/s rate. The results display that the performance is substantially better for the proposed scheme. Transmission reaches of both 4QAM PCTWs and RZ-4QAM PCTWs schemes are extended by 77.8% and 100%, respectively, in contrast with the 4QAM scheme.
Naseer K. Kasim; Ahmed F. Atwan; Fadhil Mahmood Oleiwi
Volume 19, Issue 2 , April 2019, , Page 50-57
Abstract
Any work to improve the performance of the solar modules could add to their economic competitiveness against fossil fuels. In the present work the performance of PV solar module was improved by using V-Trough concentrator system (CPV) which moved by two axis tracking system. The concentrator consists ...
Read More ...
Any work to improve the performance of the solar modules could add to their economic competitiveness against fossil fuels. In the present work the performance of PV solar module was improved by using V-Trough concentrator system (CPV) which moved by two axis tracking system. The concentrator consists of two flat reflectors of area 2 m2 for each one with geometric concentration ratio of 2X. To optimize the performance of the V-Trough CPV systems, two types of reflector material, Aluminum and mirror (glass coated by silver nitrate) were used. The results indicated that the temperature of PV reference module was higher than the ambient temperature by 27oC but there is too small difference in temperature between the tracking PV module with the reference which ranged to 2oC, while the temperature of the CPV system was higher than reference by 37oC. The temperature of the PV module under mirror reflectors was lower than module combined with Aluminum reflectors by 3oC. As a result of arising of the temperature of CPV system in compare with PV reference module, the open circuit voltage was droop by 0.7 V, 0.5 V for PV module under mirror and Aluminum reflectors respectively. The reflectors increased the short circuit current values by 2.1 A, 2.6 A for PV module combined with mirror and Aluminum reflectors respectively. Accordingly the performance (as an average daily gain of output power) of the PV solar module was improved by using V-Trough CPV system, 44%, 34% by using Aluminum and mirror reflectors respectively.
Suhad Ibrahim Mohammed; Noor Abdulmuttaleb Jaafar; Kilan Mohammed Hussien
Volume 18, Issue 3 , December 2018, , Page 52-59
Abstract
Face recognition is one of the most important research fields of the lasttwo decades. This is due to the actual use of this technology in automatic detectionand monitoring systems. Face attribute and features recognition from images isstill a challenge. In this paper, face image recognition is proposed ...
Read More ...
Face recognition is one of the most important research fields of the lasttwo decades. This is due to the actual use of this technology in automatic detectionand monitoring systems. Face attribute and features recognition from images isstill a challenge. In this paper, face image recognition is proposed upon local faceimage rather than focusing on the whole image recognition by applying preprocessingtechniques and Viola-Jones method. Principal Component Analysis(PCA) method is used in order to extract the needed features. Experiments showsatisfied and more accurate results achieved by the proposed system comparing tothe existing systems.
Hawraa R. Abdul Ameer; Hamid M. Hasan
Volume 20, Issue 1 , January 2020, , Page 53-67
Abstract
The MQTT protocol is one of the Internet of Things (loT) application protocols. It is based on publishing/subscribing messaging patterns. This protocol uses a broker to manage the communication between the subscribers and the publishers over the internet. There were two problems associated with the implementation ...
Read More ...
The MQTT protocol is one of the Internet of Things (loT) application protocols. It is based on publishing/subscribing messaging patterns. This protocol uses a broker to manage the communication between the subscribers and the publishers over the internet. There were two problems associated with the implementation of this protocol. The first one, there are many sensors generating huge data using the very simple IoT architecture. These big data may lead to congestion on the internet and thus will cause several disadvantages such as decreasing throughput, packet loss, and delay, which in turn may affect the performance of the MQTT broker, thus affecting the mechanism of the performance of the IoT application. The second problem, the MQTT protocol does not contain a priority management algorithm which is considered a very important and special issue in health applications. In this paper, a smart gateway is designed to enhance the MQTT networks. This work introduced the smart e-health gateway used in MQTT based remote Electrocardiogram (ECG) monitoring system. A new architecture has been implemented that contains two new components, the local broker and the publisher /subscriber (pub/sub) models. The local broker works in the local network and the publisher /subscriber (pub/sub) model is responsible for the process of smart in the gateway. One of the smart applications was used is a filter application. We’ve taken the data filtering side and give it a priority, as an example in order to know the possibility of achieving the architecture of the gateway that was created in our work. And is this architecture valid to work or invalid. Therefore, we conducted a test using the application of ECG signal filtration and give priority to patients according to the case of an urgent for each patient. The R-peaks were calculated from the ECG signals-peaks for the identification of heart rate. The urgent level will be classified depending on the beats rate feature. The proposed smart gateway function is to manage the data rate that will pass through to the internet. In the case of high urgent level, all the packets will be passed, while in case of a low level, the least possible data will be passed. The proposed system scenarios are designed and evaluated by using the OMNET simulation environment and Inet4 framework. The simulation results are shown by the evaluation methods used (delay, throughput, packets sent, and packets received). These results proved the success of the architectural work that was implemented in the system.
Israa N. Mahmood; Hasanen Abdullah
Abstract
Lung cancer is one of the most fatal cancers in the world for both genders. It has a high mortality rate compared to other types of cancer. Early detection can save lives and enhance the treatment process. As a result, the demand for approaches to detect cancer at an early stage is growing. In this paper, ...
Read More ...
Lung cancer is one of the most fatal cancers in the world for both genders. It has a high mortality rate compared to other types of cancer. Early detection can save lives and enhance the treatment process. As a result, the demand for approaches to detect cancer at an early stage is growing. In this paper, an Artificial Neural Network (ANN) model is developed to identify the level of having lung cancer based on environmental, diagnostic, and statistical factors. The features that highly affect the risk level of lung cancer were identified. The model's performance was assessed using a variety of criteria, including accuracy, precision, recall, and f-measure. Experimental results show that the model attains a high accuracy rate of 91.79% and risk factors like obesity, alcohol use, genetic risk, and coughing of blood can lead to lung cancer.
Teena Abbas Ali; Ahmed Mudheher Hasan
Volume 20, Issue 4 , October 2020, , Page 58-70
Abstract
Autonomous vehicle navigation has witnessed a huge revolutionary revision regarding development in Micro-Electro Mechanical System (MEMS) technology. Most recently, Strapdown Inertial Navigation System (SDINS) has successfully been integrated with Global Positioning System (GPS). However, different grades ...
Read More ...
Autonomous vehicle navigation has witnessed a huge revolutionary revision regarding development in Micro-Electro Mechanical System (MEMS) technology. Most recently, Strapdown Inertial Navigation System (SDINS) has successfully been integrated with Global Positioning System (GPS). However, different grades of MEMS inertial sensors are available and choosing the convenient grade is quite important. Noises in inertial sensor are mostly treated through de-noising the additive errors to improve the precision of SDINS output. Unfortunately, integration in SDINS mechanization causes a growing in SDINS error output which considered the main challenge in integrating MEMS inertial sensors with GPS. This paper aims to promote the long-term performance of the MEMS-SDINS/GPS integrated system. A new integrated structure is proposed to model the nonlinearities that exist in SDINS dynamics in addition to the error uncertainty in the inertial sensors’ measurements. A robust Nonlinear AutoRegressive models with eXogenous inputs (NARX) based algorithm are designed for data fusion in the proposed GPS/INS integrated system. Validation for the proposed integrated system has been carried out using different field tests data in order to assess the accuracy of the system during GPS denied environment. The results obtained demonstrate that the proposed NARX model is applicative and satisfactory which shows a desired prediction performance.
Hiba Salah Yaseen; Ahmed Al-Saadi
Abstract
Software Defined Network (SDN) is a modern network architecture that has a centralized controller. It is more flexible, and programmable due to the separation of the control plane from the data plane. However, Distributed Denial of Service (DDoS) attacks is one of the dangers that the SDN network is ...
Read More ...
Software Defined Network (SDN) is a modern network architecture that has a centralized controller. It is more flexible, and programmable due to the separation of the control plane from the data plane. However, Distributed Denial of Service (DDoS) attacks is one of the dangers that the SDN network is facing. It could attack and stop the controller from working, causing the whole system to be down. Moreover, DDoS attacks can target the hosts and the switches to stop the services for a long time as they could cause more damage to the network or datacenter. In this work, a proposed approach is utilized to protect datacenter networks and servers from DDoS attacks using entropy and real SDN-controller Python Network Operating system (POX) by redirect traffic to the edge of the datacenter to minimize the damage. The results of this experiment show how to detect abnormal traffics in an early stage and isolate them in a server outside the datacenter to distribute the huge amount of traffic in more than one server and avoid congestion on switches. Also, the throughput of the server was increased by about %16 during the suspected attack, this means maintaining the service until further analysis to be done on the traffic. These results are compared with the direct block mitigation method which was mostly used with the entropy detection method in previous researches. Moreover, this work is done to confirm whether the suspected traffic is an actual attack or not. Therefore, this method will decrease the false positives of detection.
Computer
Heba Mohammed Fadhil; Mohammed Najm Abdullah; Mohammed Issam Younis
Abstract
Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and ...
Read More ...
Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evaluated based on a variety of criteria, including the generation technology, test strategy method, supported interactions, mixed coverage ,and support constraints between parameters. CT analysis had a wide range of interaction assistance options available to researchers. Since 2010, a unified interaction has been the most common style of interaction between the two parties. The year 2018 was hailed as the most successful in terms of CT by researchers. Researchers should focus on one test at a time and metaheuristic search strategies for t-way CT. There has also been a significant increase in the popularity of other trends, such as deep learning (DL). CT appears to be a useful testing technique for balancing and fault detection capabilities for a variety of systems and applications, according to our research. Future research and software development may benefit from this information.
Hayder Waleed Shnain1; Mohammed Najm Abdullah2; Hassan Awheed Jeiad3
Volume 21, Issue 1 , March 2021, , Page 62-72
Abstract
Recently, video files and images have became the dominant media material for transmitting or storing across different applications that are used by different people. So, there was a serious need to find more effective and efficient video compression techniques to reduce the large size of such multimedia ...
Read More ...
Recently, video files and images have became the dominant media material for transmitting or storing across different applications that are used by different people. So, there was a serious need to find more effective and efficient video compression techniques to reduce the large size of such multimedia files. This paper proposes SIMD based FPGA lossless JPEG video compression system with the facility of scalability. Generally, the proposed system consists of a software side and a hardware side. The digital video file is prepared to be processed by the hardware side frame by frame on the software side. The hardware side is proposed to consist of two main processing circuits, which are the prediction circuit for calculating the predicted value of each pixel in the certain frame and the encoding circuit that was represented by a modified RLE (Run-Length-Encoder) to encode the result obtained through subtracting the predicted value from the real value for each pixel to produce the final compressed video file. The compression ratio obtained for the proposed system is equal to 1.7493. The throughput improvement for the two and four processing units basing on SIMD architecture was 100 MP/s and 200 MP/s, respectively. The clock results showed that the number of clocks required had become 50% and 25% when using two processing units and four processing units, respectively, from the number of clocks using single processing units.
Computer
Ayman Basheer Yousif; Hassan Hassan Jaleel; Ghaida Muttasher
Abstract
Network traffic has risen in recent years to the point that it is obviously and astonishingly in 2020, with the increase predicted to double in the following days. Up to 23 Teraa bit every month is an incredible amount. The Active Queue Management (AQM) algorithm is one of the most significant study ...
Read More ...
Network traffic has risen in recent years to the point that it is obviously and astonishingly in 2020, with the increase predicted to double in the following days. Up to 23 Teraa bit every month is an incredible amount. The Active Queue Management (AQM) algorithm is one of the most significant study areas in network congestion control; nevertheless, new self-learning network management algorithms are needed on nodes to cope with the huge quantity of traffic and minimize queuing latency, used reinforcement learning for automatic adaptive parameter with the AQM algorithm for effective network management, and present a novel AQM algorithm that focuses on deep reinforcement learning to deal with latency and the trade-off between queuing delay and throughput; choose Deep Q-Network (DQN) as the foundation for our scheme and equate it with Random Early Detection (RED) Results based on Network simulation (NS3) simulation suggest that the DQN algorithm has good and better results were obtained from RED, where the difference reached a drop rate of 2%, and this percentage is considered good, in addition to the percentage of throughput and the packet transfer rate of 3% is better in the proposed algorithm.
A. A. Salman; H. T. Ziboon
Volume 18, Issue 2 , September 2018, , Page 63-67
Abstract
The Powerline Communications (PLC) technology allows datatransmission through electrical wires. Thus the electrical wiring will representa data transmission channel conformable to the physical layer of the opensystem interconnection (OSI) model. In this work, the specifications of the Iraqielectrical ...
Read More ...
The Powerline Communications (PLC) technology allows datatransmission through electrical wires. Thus the electrical wiring will representa data transmission channel conformable to the physical layer of the opensystem interconnection (OSI) model. In this work, the specifications of the Iraqielectrical network were used to model a high-voltage transmission line using atransmission (ABCD) matrix and use it as a communication channel fortransmitting data within a narrow band (30-500). The transfer function of thesuggested model was derived and its performance analysis was performed toevaluate the Line length effect, load impedance ZL and the source impedance ZSon the channel frequency response. This analysis was done with the help ofMatlab16a simulator program.
Computer
Tameem Obaida; Nidaa Flaih Hassan; Abeer Salim Jamil
Abstract
This Face detection is considering one of the important topics for recognizing human, it is the first step before the face recognition process, it is considered one of the biggest challenges in the field of vision computer. In recent years Many algorithms for detection have appeared, which depend on ...
Read More ...
This Face detection is considering one of the important topics for recognizing human, it is the first step before the face recognition process, it is considered one of the biggest challenges in the field of vision computer. In recent years Many algorithms for detection have appeared, which depend on extracting the features of the human face, and works continue to develop them to this day. This paper aims to make a comparison between two of the most commonly face detection methods, Viola Jones (V_J) and YOLO v3. This comparison is made to determine which of the two algorithms is being most useful when used to detect faces in digital video. These algorithms are used in many applications, including image classification, medical analysis of image, and objects detection in real time (especially in surveillance cameras). Both algorithms are applied to detect faces in the real time video. The experimental results of a sample consists of 20 video frames show that V_J algorithm consumes less time in comparison with YOLO v3 algorithm, but its results are less accurate, unlike the YOLO v3 algorithm, which is slower in detect face with high accurate rate.