Hassan J. Hassan; Noor Kadhim Hadi
Volume 17, Issue 1 , December 2017, , Page 1-9
Abstract
There are many critical cases in which the patients need continuous monitoring by the medical staff. Implementing wireless sensor network in medical field helps the medical staff to monitor the patients remotely. This system is designed to collect the patient’s physiological parameters, and store them ...
Read More ...
There are many critical cases in which the patients need continuous monitoring by the medical staff. Implementing wireless sensor network in medical field helps the medical staff to monitor the patients remotely. This system is designed to collect the patient’s physiological parameters, and store them in the database. The doctor monitors the patient continuously in real time. In this project the biomedical sensor nodes used are temperature and heart rate sensors; Arduino UNO is used as a microcontroller for data processing, and then the messages are transmitted to the base station via Bluetooth wireless technology. The Raspberry Pi is used as a system personal server. The results, reports and other information related to the patients are displayed in website pages which are suitable for the desktop, Personal Digital Assistance (PDA) and mobile devices.
Hussein S. Mohammed; Bashar F. Midhat; Firas A. Raheem
Abstract
This paper addresses the problem of position control and stabilization for the two wheeled balancing robot. A mathematical model is derived based on the robot’s position and tilt angle and a fuzzy logic control is proposed for the balancing robot control. The fuzzy logic controller performance ...
Read More ...
This paper addresses the problem of position control and stabilization for the two wheeled balancing robot. A mathematical model is derived based on the robot’s position and tilt angle and a fuzzy logic control is proposed for the balancing robot control. The fuzzy logic controller performance is compared with a conventional PID controller to show the difference between them. Both controllers were tested on the balancing robot in simulation using MATLAB software and the results were put together for a comparative point of view. The simulations shows a relative advantage for the fuzzy logic controller over the conventional PID controller especially in reducing the time required for stabilization which takes about 2 seconds and almost without overshoot while in the PID case the robot will have about 10% overshoot in position and about 20 degrees in tilt angle.
Ahmed S. Al-Araji1; Attarid K. Ahmed
Volume 18, Issue 2 , September 2018, , Page 1-16
Abstract
This paper presents a cognitive system based on a nonlinear Multi-Input Multi-Output (MIMO) Proportion Integral Derivative (PID) Modified Elman Neural Network(MENN) controller and the Square Road Map (SRM) method to guide the mobile robot duringthe continuous path-tracking with collision-free navigation ...
Read More ...
This paper presents a cognitive system based on a nonlinear Multi-Input Multi-Output (MIMO) Proportion Integral Derivative (PID) Modified Elman Neural Network(MENN) controller and the Square Road Map (SRM) method to guide the mobile robot duringthe continuous path-tracking with collision-free navigation through static obstacles. Theproposed cognitive system consists of two parts: the first part is to plan the desired path for themobile robot with the static obstacle environment in order to determine the target point and toavoid the obstacles based on the proposed square road map algorithm. The second part is toguide and track the wheeled mobile robot on the desired path equation based on the proposednonlinear MIMO-PID-MENN controller with the intelligent algorithm. The Particle SwarmOptimization (PSO) is used to on-line tune the variable control parameters of the proposedcontroller to get the optimal torques actions for the mobile robot platform. Based on using theMATLAB package (2017), the numerical simulation results show that the proposed cognitivesystem has high accuracy for planning the desired path equation in terms of avoiding the staticobstacles with smooth and short distance and generating a perfect torque action of (0.7 N.m)without a saturation state of (3.07 N.m), which leads to minimize the tracking pose error forthe mobile robot to the zero value approximation. These results were confirmed by acomparative study with different nonlinear PID controller types in terms of number ofiterations and the performance index.
Amer Abed Mansour; Walaa Mousa Hashim; Abbas Abdul Wahab Muhammad
Volume 18, Issue 3 , December 2018, , Page 1-11
Abstract
Pneumatic servo systems are widely used in industrial applicationsbut they are expensive, so decreasing their cost contribute in decreasingproducts manufacturing cost. In this research a pneumatic servo system (PSS)was designed and implemented using cheap conventional directional controlvalve (CDCV) ...
Read More ...
Pneumatic servo systems are widely used in industrial applicationsbut they are expensive, so decreasing their cost contribute in decreasingproducts manufacturing cost. In this research a pneumatic servo system (PSS)was designed and implemented using cheap conventional directional controlvalve (CDCV) instead of expensive servo or proportional valves. The CDCVwas driven using pulse width modulation (PWM) technique, which wasgenerated in the LabVIEW program and send to the CDCV via Arduino unomicrocontroller board. A fuzzy PI controller was designed and implemented toovercome the nonlinearity inherent in air systems, resulting from aircompressibility and dry friction, and the nonlinearity resulting from the use of aCDCV which is a digital valve. It is found that getting acceptable resultsrequire using PWM technique with frequencies greater than 90 Hz. The resultsshowed that increasing the applied pressure leads to a significant decrease inthe rising time but accompanied with a noticeable increase in the rippleamplitude. So, getting accepted results require choosing the applied pressureexperimentally to suit the applied load, since they are affected by the appliedload.
Hanan A. R. Akkar; Wael A. H.; Ibraheem H. M. Al-Dosari
Volume 19, Issue 1 , January 2019, , Page 1-9
Abstract
One of the main problems in the oil industrial field is the leakage intransporting pipelines due to its effect on human society , environment, and money loss.Therefore, the bottleneck for most researches in this subject is to minimize false alarm rate(FAR) for the adopted leak detection method. Although ...
Read More ...
One of the main problems in the oil industrial field is the leakage intransporting pipelines due to its effect on human society , environment, and money loss.Therefore, the bottleneck for most researches in this subject is to minimize false alarm rate(FAR) for the adopted leak detection method. Although some recent methods succeed inclassifying the existence or absence of the leak as a binary classification problem. But thispaper proposed a novel leak detection technique which predicts the leak location andestimates its size within certain pre-defined ranges. In order to simulate the environmentalconditions for real-time operating oil pipeline, accurate simulator known as OLGAprogram creates the oil physical parameters. Various methods for features extraction areconsidered such as statistical and wavelet techniques which are implemented to get thefeatures from the fluid simulated waveforms. These features are organized and fed to anANN classifier trained by PSO algorithm to determine the leak class out of 10 suggestedclasses. The proposed leak detection technique is used to simulate 18 kilometers belongingto Iraqi crude oil pipelines company operated in Baghdad. The achieved results of the truepositive rate (TPR) for the proposed applied method for the leak detection andclassification of different leak classes in terms of their positions and magnitudes wereabout 97%.
Hasan M. Qays; Bassim A. Jumaa; Ayman D. Salman
Volume 20, Issue 1 , January 2020, , Page 1-15
Abstract
In recent years Quadcopter has been used in many applications such as military, security & surveillance, service delivery, disaster rescue and much more due to its flexibility of flying. In this paper, Quadcopter will be used for mail delivery between many locations that is received from the end ...
Read More ...
In recent years Quadcopter has been used in many applications such as military, security & surveillance, service delivery, disaster rescue and much more due to its flexibility of flying. In this paper, Quadcopter will be used for mail delivery between many locations that is received from the end user. The Quadcopter will execute an autonomous flight using the concept of companion PC. Raspberry PI 3 (RPI3) will control the Quadcopter by command the controller of the drone (Pixhawk) by using DroneKit-Python API to send MAVLink messages to the Ardupilot. This concept is useful to perform an additional task to the autopilot and provide such a smart capability like image processing and path planning which cannot be done by the flight controller alone. Basically, the idea has been stimulated and the code has been tested by using the SITL Simulator with MAVProxy under Ubuntu environment. The result of controlling the Quadcopter using Python script was excellent and give a motivation to implement the same script on a real Quadcopter. The implementation on real Quadcopter was perfect as it has given the same behavior as the SITL drone in the simulation.
Hussein A. Abdulkadhim; Mayyadah S. Ibrahim; Ali N. Albu-Rghaif
Volume 20, Issue 2 , April 2020, , Page 1-9
Abstract
Autoregressive (AR) random fields are widely use to describe changes in the status of real-physical objects and implemented for analyzing linear & non-linear models. AR models are Markov processes with a higher order dependence for one-dimensional time series. Actually, various estimation methods ...
Read More ...
Autoregressive (AR) random fields are widely use to describe changes in the status of real-physical objects and implemented for analyzing linear & non-linear models. AR models are Markov processes with a higher order dependence for one-dimensional time series. Actually, various estimation methods were used in order to evaluate the autoregression parameters. Although in many applications background knowledge can often shed light on the search for a suitable model, but other applications lack this knowledge and often require the type of trial errors to choose a model. This article presents a brief survey of the literatures related to the linear and non-linear autoregression models, including several extensions of the main mode models and the models developed. The use of autoregression to describe such system requires that they be of sufficiently high orders which leads to increase the computational costs
Abeer D. Salman; Hala B. Abdulwahab
Volume 20, Issue 3 , July 2020, , Page 1-15
Abstract
Recently, three Dimension (3D) multimedia technology has grown over a wide range, where the 3D used in many applications such as medical, television, cinema, game, education, etc. The developments also include the computer network, these evaluations make the store and distribute the media very easy and ...
Read More ...
Recently, three Dimension (3D) multimedia technology has grown over a wide range, where the 3D used in many applications such as medical, television, cinema, game, education, etc. The developments also include the computer network, these evaluations make the store and distribute the media very easy and at the same time very critical, where any person can access these data and manipulate it or redistribute it with illegal copyrights. Therefore, it is necessary to find a watermarking technique to keep the security of these media. 3D multimedia, especially 3D Video contains a huge amount of data, trying achievement copyright protection for all these data consumes the computation, and slow down securing process, thus 3D video key frame extraction process is necessary. In this paper, the histogram-based key frame extraction technique is applied to extract essential and important data of the 3D video. A modified invisible, and blind watermark system is suggested in this research for 3D Video copyrights and authentication protection using Dual-Tree Complex Wavelet Transform (DTCWT). The experiment results show that 3D video key extraction system has given high compression ratio ( from 4:1 to 5:1) and the protection system could put an invisible watermark while keeping the quality of the 3D video, as well as the proposed watermark system, is robust where the watermark extracted successfully after applying a different types of attack.
Mohamed J. Ali; Alaa Hussein Ali; Aseel I. Mahmood; Mohammed A. hussien
Volume 20, Issue 4 , October 2020, , Page 1-8
Abstract
Fiber Bragg Grating sensors have a wide range of applications, ranging from their use for health monitoring, in medical applications and also as biomedical sensors, among others. Moreover, since fiber Bragg gratings have many advantages that qualify them to be of great benefit, of course, the most important ...
Read More ...
Fiber Bragg Grating sensors have a wide range of applications, ranging from their use for health monitoring, in medical applications and also as biomedical sensors, among others. Moreover, since fiber Bragg gratings have many advantages that qualify them to be of great benefit, of course, the most important of these applications are vital signs of human health condition Such as blood pressure, heart rate (pulse rate), and body temperature. The Vital-signs are noticeable variables. The temperature and blood pressure are changed according to the physical, involuntary, nervous and psychological state of the person. Therefore, the measurement of vital signs is very necessary, In this work, fiber Bragg grating sensor has been designed and simulated to study the performance of fiber Bragg grating sensor as a Body temperature of human beings ranged from (35°C to 40°C, which is from hypothermia to hyperthermia) and blood pressure that ranged between lower and higher extremities (40 to 190 mmHg ) from hypotension to hypertension, using optigrating and optisystem simulation softwar. The designed sensor was very sensitive to human temperature and blood pressure ranges which were 13.632 pm/oC and 15.75 pm/mmHg, respectively.
Zainab Ali Mohammed; Mohammed Najm Abdullah2; Imad Husain Al Hussaini
Volume 21, Issue 1 , March 2021, , Page 1-15
Abstract
Traffic incidents dont only cause various levels of traffic congestion but often contribute to traffic accidents and secondary accidents, resulting in substantial loss of life, economy, and productivity loss in terms of injuries and deaths, increased travel times and delays, and excessive consumption ...
Read More ...
Traffic incidents dont only cause various levels of traffic congestion but often contribute to traffic accidents and secondary accidents, resulting in substantial loss of life, economy, and productivity loss in terms of injuries and deaths, increased travel times and delays, and excessive consumption of energy and air pollution. Therefore, it is essential to accurately estimate the duration of the incident to mitigate these effects. Traffic management center incident logs and traffic sensors data from Eastbound Interstate 70 (I-70) in Missouri, United States collected during the period from January 2015 to January 2017, with a total of 352 incident records were used to develop incident duration estimation models. This paper investigated different machine learning (ML) methods for traffic incidents duration prediction. The attempted ML techniques include Support Vector Machine (SVM), Random Forest (RF), and Neural Network Multi-Layer Perceptron (MLP). Root mean squared error (RMSE) and Mean absolute error (MAE) were used to evaluate the performance of these models. The results showed that the performance of the models was comparable with SVM models slightly outperforms the RF, and MLP models in terms of MAE index, where MAE was 14.23 min for the best-performing SVM models. Whereas, in terms of the RMSE index, RF models slightly outperformed the other two models given RMSE of 18.91 min for the best-performing RF model.
Reem Razzaq Abdul Hussein; Muayad Sadik Croock; Salih Mahdi Al-Qaraawi
Volume 19, Issue 2 , April 2019, , Page 1-8
Abstract
This research deals with the using of correlation measurement that leads todescribing the degree of relationship between variables, quantities or qualities. Therefore,we implement a simple correlation coefficient and conditional correlation to introduce aregular vine copula, which gives different tree ...
Read More ...
This research deals with the using of correlation measurement that leads todescribing the degree of relationship between variables, quantities or qualities. Therefore,we implement a simple correlation coefficient and conditional correlation to introduce aregular vine copula, which gives different tree structures. Two methods to select treestructures are introduced. The first one adopts the Partial Correlation Constant (PCC)with constant, while the second method depends on the estimation of summation pathway.The proposed method makes modification on Diβmann’s algorithm to increase thedependency on each level of the tree using rank correlation measurement. Both methodsare adopted to construct the best model with more than three dimensions based on theavailable label crime dataset in Iraq. The selected model is used for selecting the suitabletree model and generating a decision with the low dimensionality of variables.
Kawther Dawood Salman; Ekhlas Kadum Hamza
Volume 21, Issue 2 , June 2021, , Page 1-15
Abstract
Wireless Fidelity (Wi-Fi) is particularly popular today. Every place hashotspots to access the internet via Wi-Fi, including homes, offices, colleges, and otherpublic places. This increased number of users, and hence the use of bandwidth, has led toradio spectrum congestion. Thus, in the year of 2011, ...
Read More ...
Wireless Fidelity (Wi-Fi) is particularly popular today. Every place hashotspots to access the internet via Wi-Fi, including homes, offices, colleges, and otherpublic places. This increased number of users, and hence the use of bandwidth, has led toradio spectrum congestion. Thus, in the year of 2011, Light-Fidelity (Li-Fi) wasintroduced, which applies a visible light region for data transmission, to solve this radiocrisis problem. This visible part of the spectrum was 10,000 times big compared to thepart utilized in the Wi-Fi radio. Furthermore, Li-Fi was a sub-set of Visible LightCommunication (VLC), using Light-Emitting Diode (LED) bulbs for transmitting datautilizing light-medium. This paper reviews the differences between Li-Fi technology andwireless types. It Also focuses on the architecture, components, functioning, modulationtechnologies, and applications of Li-Fi.
Heba Hakim; Zaineb M. Alhakeem; Ali Fadhil
Abstract
Simultaneously and location mapping (SLAM) is an important technique for achieving a full autonomous navigation system by constructing a 2D map of the surrounding environment. A performance of two popular distance sensor (Asus Xtion Pro Camera and 2D LiDAR) in building a map of the indoor environment ...
Read More ...
Simultaneously and location mapping (SLAM) is an important technique for achieving a full autonomous navigation system by constructing a 2D map of the surrounding environment. A performance of two popular distance sensor (Asus Xtion Pro Camera and 2D LiDAR) in building a map of the indoor environment using Hector SLAM is presented in this paper. Navigation system using 2D LiDAR can only detect object on a certain level of plane. This leads to miss the obstacles that are below and/or above the level of laser scan. So the generated map will be inaccurate that causes collision during autonomous navigation. Asus Xtion Pro sensor can be a low cost alternative for a laser distance sensor in addition to its ability to provide 3D data. Using data of depth image, the entire obstacle will be detected to prevent collision. Many experiments in real time scenarios in indoor environment have been conducted to evaluate the performance of the RGB-D sensor vs. 2D LiDAR in constructing a 2D map. Furthermore, the results also indicate that some modifications on the parameters of Hector SLAM method are able to enhance the accuracy of map which is constructed by Asus Xtion Pro camera. Therefore, Asus Xtion Pro offers a good alternative to build a 2D map using Hector SLAM. This work is implemented in ROS on Raspberry Pi 3 B+.
Sondous Sulaiman Wali; Mohammed Najm Abdullah
Abstract
It is known that many individuals suffer from chronic diseases such as heart disease, high blood pressure, and sleep apnea, which requires constant monitoring, which is only found in the hospital, and the high cost that the individual cannot afford, especially at present. This paper proposes a system ...
Read More ...
It is known that many individuals suffer from chronic diseases such as heart disease, high blood pressure, and sleep apnea, which requires constant monitoring, which is only found in the hospital, and the high cost that the individual cannot afford, especially at present. This paper proposes a system through which an individual can monitor vital signs and can use the wearable device by himself without the need for assistance. Wearable devices have been used from the sensors where the proposed system uses six sensors which are the electrocardiogram, the pulse oximeter, heart rate, blood pressure, skin temperature, temperature, and humidity as it collects data and then transfers it via Wi-Fi to the microcontroller on the Internet of things. The results of the sensors have been successfully obtained. Finally, linked them to the Blynk platform that displays the desired results for the individual.
Ghufran Isam Drewil; Riyadh Jabbar Albahadili
Abstract
Air pollution is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. This problem results from the abundance of automobiles, industrial production, and combustion of transportation and electricity generation petroleum products. Therefore, ...
Read More ...
Air pollution is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. This problem results from the abundance of automobiles, industrial production, and combustion of transportation and electricity generation petroleum products. Therefore, forecasting air pollution is necessary. In this paper, a system is proposed to monitor the level of air pollution by integrating the Internet of Things(IoT) with Wireless Sensor Networks (WSN), where pollution levels are observed in three areas in Baghdad using different types of sensors connected with ESP32 (It is the name of the chip developed by Espressif Systems) to detect Particulate Matter (PM2.5 and PM10), Nitrogen Oxides (NOx), Carbon monoxide (CO) as well as temperature and humidity to monitor indoor and outdoor air quality. Observed results are monitored by ThingSpeak, an open- source IoT platform. Success has been achieved using the ESP32 microcontroller, as the project is low-cost and uncomplicated, and pollutant measurement is accurate compared to the natural proportions of pollutants. Data display is easy and it can be monitored easily. This encourages the improvement of the model and its use in other monitoring systems.
Computer
Shaymaa Ammar Fadhil; Alaa K. Farhan
Abstract
Cryptographic approaches based on chaos theory provide a several new and promising avenues for developing safe picture encryption solutions. This paper aims to complicate the process of decrypting images by adding encryption with keys, this was achieved by applying the principle of the 3D-chaotic system ...
Read More ...
Cryptographic approaches based on chaos theory provide a several new and promising avenues for developing safe picture encryption solutions. This paper aims to complicate the process of decrypting images by adding encryption with keys, this was achieved by applying the principle of the 3D-chaotic system with the encryption algorithm, so we present an image encryption algorithm called black mask by using an efficient Multidimensional Chaotic Map represented by Lorenz system. For the confusion process, the suggested approach is based on a keys stream generator. The process of confusion is initiated by a 256-bit secret keys, which is produced by a logistic maps. To make the cipher more dynamic in the face of any threat. The suggested digital image encryption technique, as well as its security analysis and implementation, are discussed in depth. The experimental results suggest that the proposed method for image encryption and transmission is both efficient and safe.
Computer
Basma Wael Abdullah; Hanaa Mohsin Ahmed
Abstract
since the global pandemic of COVID-19 has spread out, the use of Artificial Intelligence to analyze Chest X-Ray (CXR) image for COVID-19 diagnosis and patient treatment is becoming more important. This research hypothesized that using COVID19 radiographic changes in the X-Ray images. Artificial Intelligence ...
Read More ...
since the global pandemic of COVID-19 has spread out, the use of Artificial Intelligence to analyze Chest X-Ray (CXR) image for COVID-19 diagnosis and patient treatment is becoming more important. This research hypothesized that using COVID19 radiographic changes in the X-Ray images. Artificial Intelligence (AI) systems may extract certain graphical elements regarding COVID-19 and offer a clinical diagnosis ahead of pathogenic test; therefore, saving vital time for disease prevention. Employing 2614 CXR radiographs from Kaggle data collection of verified COVID-19 cases and healthy persons, a new Convolutional Neural Network (CNN) model that is inspired by the Xception architecture was presented for the diagnosis of coronavirus pneumonia infected patients. The suggested technique reached an average validation accuracy of 0.99, precision of 0.95, recall of 0.92, and F1-score of 0. 95. Finally, such findings revealed that the Deep Learning (DL) technique has the potential to decrease frontline radiologists' stress, enhance early diagnosis, treatment, and isolation; therefore, aid in epidemic control.
Computer
Haider Saeed Wdhayeh; Raghad Abdulaali Azeez; Athraa Jasim Mohammed
Abstract
In this paper, an algorithm to hide information in an image using QR code technology is presented. QR Code “QUICK RESPONSE CODE” is a two-dimensional array that can include different types of data and was first developed in 1993 for the Japanese Toyota Corporation for the purpose of tracking ...
Read More ...
In this paper, an algorithm to hide information in an image using QR code technology is presented. QR Code “QUICK RESPONSE CODE” is a two-dimensional array that can include different types of data and was first developed in 1993 for the Japanese Toyota Corporation for the purpose of tracking products through production and marketing. The researchers paid great attention to QR code technology especially in the field of information security. The proposed algorithm in this paper hides the secret text in the image in a random way by generating random positions and using the LSB “Least Significant Bit” method. After that, the random positions are saved in the QR code file, and this is the hiding stage. In the extraction stage, the QR code file is read first to extract the positions where the secret text has been hidden. After that, the secret text is read according to the LSB method. The algorithm was implemented using the C-Sharp programming language and Microsoft Visual Studio 2019 development environment. After conducting experiments on a number of images and extracting results based on the PSNR “Peak signal-to-noise ratio “test method, the results were good and the algorithm is very strong against a brute force attack. This algorithm can be used in building authentication systems.
Computer
Dina M. Abdulhussien; Laith J. Saud
Abstract
Face detection technology is the first and essential step for facial-based analysis algorithms such as face recognition, face feature extraction, face alignment, face enhancement, and face parsing. That is besides serving other applications related to human intention and act analysis such as facial expression ...
Read More ...
Face detection technology is the first and essential step for facial-based analysis algorithms such as face recognition, face feature extraction, face alignment, face enhancement, and face parsing. That is besides serving other applications related to human intention and act analysis such as facial expression recognition, gender recognition, and age classification. Face detection is used to detect faces in digital images. It is a special case of object detection and can be used in many areas such as biometrics, security, law enforcement, entertainment, and personal safety. There are various methods proposed in the field of face detection, and they all compete to make it more advanced and accurate. These methods belong to two main approaches; feature-based approach and image-based approach. This paper reviews the face detection methods that belong to the feature-based approach. Moreover, their work concepts, strengths, and limitations are mentioned. This paper concentrates on the feature-based approach due to its simplicity and high applicability in real-time detection compared to the image-based approach.
Computer
Maryam Raad Shihab; Rana Fareed Ghani; Athraa Jasim Mohammed
Abstract
The traffic surveillance system is a type of intelligent system of traffic control. Traffic control provides solutions to most problems faced by people. It helps to monitor, detect traffic congestion and traffic accidents. As science evolved, it became possible to control traffic using video surveillance. ...
Read More ...
The traffic surveillance system is a type of intelligent system of traffic control. Traffic control provides solutions to most problems faced by people. It helps to monitor, detect traffic congestion and traffic accidents. As science evolved, it became possible to control traffic using video surveillance. Video surveillance is the most economical option that does not involve high costs or changes in infrastructure. Vehicle detection is one of the main parts of the traffic surveillance system. In this paper, vehicles will be detected using two different artificial intelligence methods (the YOLO method and the HAAR cascade classifier method). The first one is smarter than the second method, and both of them contain machine learning. The first processing step will read the video. Then vehicle detection algorithms are applied using two different ways. The comparison between them depends on the results to find the most effective and applicable vehicle detection method. After implementing the two methods, results were obtained using YOLO, that the accuracy is 91.31% and the error rate is 8.69%, in time 10 sec. As for using the XML (HAAR cascade classifier method) method, the accuracy is 86.9%, the quality is 86.9%, completeness is 90.9%, and the error rate is 13%, in time 17 sec. Thus, we conclude that the YOLO method has better results than the second method.
Computer
Farah Tawfiq Abdul Hussien; Abdul Monem S. Rahma; Hala Bahjat Abdul Wahab
Abstract
Providing security for each online consumer over the internet is a critical issue that may cause a time consuming problem that may cause big load on the website server especially for the large websites at the rush time. This process may generate a variety of issues, including response time delays, client ...
Read More ...
Providing security for each online consumer over the internet is a critical issue that may cause a time consuming problem that may cause big load on the website server especially for the large websites at the rush time. This process may generate a variety of issues, including response time delays, client orders being lost, and system crash or deadlock, all of which decrease system performance. This work intends to present a new multi-agent system prototype structure that solves the challenge of security while avoiding issues that might degrade system performance. This is accomplished by installing a software agent on the client's device that handles the purchase and encryption processes without the need for the user to intervene. The suggested agent evades the problems of stalemate (i.e., failure) and request loss, ensuring that information exchanged between all entities is protected. The use of a software agent to manage buying and encrypting operations improves system performance by 10% and increases the reaction time of the system by 30.5 percent (response time, page loading time, transaction processing speed, orders per second) according to test results.
Prof. Dr. Waladin K. Sa; Mohammed Y. Algailany
Volume 11, Issue 2 , December 2011, , Page 7-19
Abstract
Abstract:
Real-Time 3D animation and Real-Time Simulation results are reported for a 3R underactuated robot moving in a horizontal plane using Virtual Reality Toolbox™, Real-Time Windows Target™,Real-Time Workshop®, and interfaced to Simulink® under the MATLAB® environment. The reason behind ...
Read More ...
Abstract:
Real-Time 3D animation and Real-Time Simulation results are reported for a 3R underactuated robot moving in a horizontal plane using Virtual Reality Toolbox™, Real-Time Windows Target™,Real-Time Workshop®, and interfaced to Simulink® under the MATLAB® environment. The reason behind Real-time 3D animation and Real-Time simulation is to provide animated real-time tools in a realistic fashion to demonstrate the effectiveness of the controllers in tracking the desired trajectory and to provide a tool for researchers to test their proposed controllers and observe their behavior using 3-DOF underactuated manipulator in real-time.
Dr.Waladin K. Sa; Dr.Ghassan A. AL-Kindi; Dr.Hussam K. Abdul-Ameer
Volume 6, Issue 3 , December 2006, , Page 9-19
Mohsin H. AL-Zohairi
Volume 12, Issue 2 , December 2012, , Page 9-15
Abstract
Abstract: Network Security for data transmission is the most vital issue in modern communication systems. This paper discusses a new steganographic technique and the effectiveness of the proposed method is described through which the idea of enhanced security of data can be achieved. To hide data in ...
Read More ...
Abstract: Network Security for data transmission is the most vital issue in modern communication systems. This paper discusses a new steganographic technique and the effectiveness of the proposed method is described through which the idea of enhanced security of data can be achieved. To hide data in a binary image, the proposed method focuses on the Least Significant Bit (LSB) technique in hiding messages in an image. The proposed method enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original message easily.
Dr. Farooq Al- doraiee; Salih Al-Qaraawi; Hassan J. Hassan
Volume 13, Issue 1 , April 2013, , Page 9-17
Abstract
Abstract – Internet represents a shared resource wherein users contend for the finite
network bandwidth. Contention among independent user demands can result in
congestion, which, in turn, leads to long queuing delays, packet losses or both.
Congestion control regulates the rate at which traffic ...
Read More ...
Abstract – Internet represents a shared resource wherein users contend for the finite
network bandwidth. Contention among independent user demands can result in
congestion, which, in turn, leads to long queuing delays, packet losses or both.
Congestion control regulates the rate at which traffic sources inject packets into a
network to ensure high bandwidth utilization while avoiding network congestion. In the
current Internet, there are two mechanisms which deal with congestion; the end-to-end
mechanism which is achieved by the Transmission Control Protocol (TCP) and the
intermediate nodes algorithms such as Active Queue Management (AQM) in routers.
In this paper, a combined model of TCP and AQM (TCP/AQM) is formulated and
first simulated without a controller. The results show that it is unable to track the desired
queue size. So, to get better tracking performance, an adaptive PID controller based on
wavelet network (AWNPID) is used as AQM in the router queue. The non-adaptive PID
controller is also demonstrated, and its weakness to the network dynamic changes is
compared to the robustness of adaptive controller (AWNPID). The analytical results for
linearized TCP/AQM model are presented in MATLAB version 7.0.