Communication
Mohammad Abd Abbas; Bilal Ghazal Ghazal; Ahmad ghandour Ghandour
Abstract
Online payment methods for e-commerce and many websites in various fields have increased significantly. Therefore, credit card frauds are easy targets, and their rate is on the rise which poses a major problem for online payments. The basic concept is to examine consumers' purchasing histories to extrapolate ...
Read More ...
Online payment methods for e-commerce and many websites in various fields have increased significantly. Therefore, credit card frauds are easy targets, and their rate is on the rise which poses a major problem for online payments. The basic concept is to examine consumers' purchasing histories to extrapolate their typical behavior patterns, classify cardholders into different groups, and then attempt to detect credit card fraud. Credit card fraud detection based on a machine learning model uses a combination of supervised and unsupervised learning techniques such as Random Forest, Decision Tree, Logistic Regression, and Extreme Gradient Boost. We used the synthetic minority oversampling (SMOTE) technique to balance the dataset. The model is trained on a large set of data related to credit card transactions and uses features such as transaction amount, transaction location, and time of day to identify patterns and anomalies in the data that indicate fraudulent activity. Our goal is to build a model based on machine learning technology that detects and analyzes online shopping fraud Detecting fraud in credit card systems is crucial to protecting consumers from financial losses and maintaining the integrity of the financial ecosystem after collecting Creditcard.csv data. With the help of several algorithms, including Random Forest (RF) algorithm accuracy reached 99%, Logistic Regression (LR) algorithm accuracy reached 97%, and Decision Tree (DT) algorithm accuracy reached 99% Researchers provide a comprehensive method for identifying fraud in credit card transactions Precision Recall F1-score. The proposed system includes four main steps: pre-processing, classification using the algorithm, and checking whether the transaction is fraudulent or not.
Computer
Amar A. Mahawish; Hassan Jalee.l Hassan
Abstract
The performance of the Internet is significantly impacted by network congestion. Because of the internet's current rapid growth, congestion could increase and cause more packets to be dropped. The Transmission Control Protocol (TCP) connection is used as the reliable transmission of packets which has ...
Read More ...
The performance of the Internet is significantly impacted by network congestion. Because of the internet's current rapid growth, congestion could increase and cause more packets to be dropped. The Transmission Control Protocol (TCP) connection is used as the reliable transmission of packets which has a Drop Tail (DT) mechanism since congestion DT signals occur only when the queue has become full. The Random Early Detection algorithm mechanism can be developed as congestion control which eliminates the drawback of a tail drop queue full. The Red algorithm also has problems dealing with different numbers of connections due to fix parameter tuning. In this study, the EXhaustive search used with the RED algorithm to develop the EX-RED algorithm. Based on network performance metrics such as packet drop, delay, and throughput, the developed algorithm adjusts the default RED parameter to find the best of them. When the number of TCP connections changes, the exhaustive search used systematically enumerates all possible states of the parameter. The simulation results showed that the EXRED improved performance of the network as compared with the other five algorithms (GRED, RED, ARED, NLRED, and NLGRED) by decreasing delay and dropped packets and increasing packet throughput.
Computer
Mohammed Majid Msallam
Abstract
In recent years, safe lockers have been spread in public places to secure valuable belongings. The people are concerned about losing safe locker keys or use of the spare key by others and will remain worried about their things. To solve the forenamed matter, this paper proposed a system that depends ...
Read More ...
In recent years, safe lockers have been spread in public places to secure valuable belongings. The people are concerned about losing safe locker keys or use of the spare key by others and will remain worried about their things. To solve the forenamed matter, this paper proposed a system that depends on biometrics to secure valuable things and can minimize their concerns and worries. The proposed system consists of two major parts, software, and hardware. In the hardware part, A microcontroller with a camera and an electronic lock will be used to securely open or close the door of the safe locker. In the software part, the images that are pictured by the camera will be prepared by an image processing algorithm and then Support Vector Machines (SVM) will be trained in the images of a person. The images and information of the person will be saved until the belongings come out and after that deletes everything to prepare for another one.
Computer
Muna Khalaf; Ban N. Dhannoon
Abstract
Semantic segmentation refers to labeling each pixel in the scene to its belonging object. It is a critical task for many computer vision applications that requires scene understanding because It attempts to mimic human perceptual grouping. Despite the unremitting efforts in this field, it is still a ...
Read More ...
Semantic segmentation refers to labeling each pixel in the scene to its belonging object. It is a critical task for many computer vision applications that requires scene understanding because It attempts to mimic human perceptual grouping. Despite the unremitting efforts in this field, it is still a challenge and preoccupies of researchers. Semantic segmentation performance improved using deep learning rather than traditional methods. Semantic segmentation based on deep learning models requires capturing local and global context information, where deep learning models usually can extract one of them but is challenging to integrate between them. Deep learning based on attention mechanisms can gather between the capturing of local and glopal information, so it is increasingly employed in semantic segmentation. This paper gives an introductory survey of the rising topic attention mechanisms in semantic segmentation. At first, it will discuss the concept of attention and its integration with semantic segmentation requirements. Then, it will review deep learning based on attention mechanisms in semantic segmentation.
Computer
Asmaa A Mohammed; Abdul Monem S. Rahma; Hala B. Abdulwahad
Abstract
The rapid "development of communication technology" has had a considerable impact on financial transactions, leading to the appearance of new types of "currency." These digital currencies are intended to streamline processes, decrease time and effort expenditures, and minimize financial losses while ...
Read More ...
The rapid "development of communication technology" has had a considerable impact on financial transactions, leading to the appearance of new types of "currency." These digital currencies are intended to streamline processes, decrease time and effort expenditures, and minimize financial losses while doing away with the need for traditional financial intermediaries and central bank regulation. Despite persistent worries and hazards that remain in the minds of people participating in currency trading and stock exchanges, digital currencies have significantly impacted the global financial industry. The fundamental issue with digital currencies is the question of the legal and regulatory frameworks. Since digital currencies are decentralized, conventional regulatory frameworks might find it difficult to keep up with the consequences of this rapidly changing technology. This may result in ambiguity and uncertainty regarding the governance and regulation of digital currency.Best in Class In addition to exploring the ideas of Bitcoin and block chain technology, this study attempts to give an overview of digital currencies, including their definition, emergence, and development. The research examined the stages of development of digital currency from its inception in 2009 to the present year, 2023. It traced the evolution of digital currency over this period. The study provided into how digital currency has evolved from its early days, marked by the introduction of Bitcoin in 2009, to its current state in 2023.
Computer
Zainab F. Makhrib; Abdulamir A. karim
Abstract
The Digital watermarking is a field of information hiding that entails hiding the crucial information in the original data in order to prevent illegal duplication and distribution of multimedia data such as image, video, text and ect.. In this paper, we present two techniques to embed watermarks in the ...
Read More ...
The Digital watermarking is a field of information hiding that entails hiding the crucial information in the original data in order to prevent illegal duplication and distribution of multimedia data such as image, video, text and ect.. In this paper, we present two techniques to embed watermarks in the cover image. The first is the Least Significant Bit (LSB) method, which is a spatial domain technique and considered fragile against attacks and other operations. The second method is the frequency domain technique, which uses Discrete Wavelet Transform (DWT) and is considered robust against attacks. The efficiency and performance of these techniques are evaluated based on Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE). From the results, the value of PSNR is above 37 dB, which ensures better imperceptibility and shows better robustness. The comparison between the two techniques shows that the hybrid method was more robust than the LSB method, hence it achieves good invisibility.
Control
Mayyasah Ali Salman; Saleem Khalefa Kadhim
Abstract
The lower limb amputees are increasing day by day. This has led to an increase in research in the field of prosthetic knee. In this work, a prosthetic knee was designed and developed to assist human movements and more quality of life for millions of individuals who have lost lower limbs. The dynamic ...
Read More ...
The lower limb amputees are increasing day by day. This has led to an increase in research in the field of prosthetic knee. In this work, a prosthetic knee was designed and developed to assist human movements and more quality of life for millions of individuals who have lost lower limbs. The dynamic model and parameter identification of a two degree of freedom (2-DOF) joint prosthetic knee is derived according to the Lagrangian dynamic approach. The two controllers Backstepping and Adaptive Backstepping are adopted to control the system. Stability analysis and controller design dependent on Lyapunov theory are assessed to prove a tracking of a desired trajectory. From the results, found that the quantitative comparison between the two controllers, showed significant improvement in results in position tracking. To comparison between Backstepping control and Adaptive Backstepping control, at the control action consumptions. It was found that the position error of the prosthetic knee in Backstepping control is by 9% at link 1 (thigh) and 7.4% at link 2 (shank) compared with desired trajectory, while in Adaptive Backstepping control is by 1.16% at link 1 and 1.65% at link 2 compared with desired trajectory. When comparing between Backstepping control and Adaptive Backstepping control, the improvement rate was 7.84 at link 1 and 5.75 at link 2 , the proposed Adaptive Backstepping control, it may be concluded, is more robust against this perturbation and to deal with uncertainty. Therefore, the controller is built in a MATLAB environment, and its performance and robustness are assessed.
Computer
Zainab A. Kamal; Rana F. Ghani
Abstract
the primary concerns with manual transactions include corruption, lack oftransparency, fraud, and mismanagement of distribution operations, all of which arecreated by traditional centralized applications, necessitating the migration to blockchaintechnology. In this work, a system is presented to secure ...
Read More ...
the primary concerns with manual transactions include corruption, lack oftransparency, fraud, and mismanagement of distribution operations, all of which arecreated by traditional centralized applications, necessitating the migration to blockchaintechnology. In this work, a system is presented to secure and monitor correspondencebetween several nodes and store it in a decentralized database in order to securedistributed ledger transactions and safeguard against fraud and tampering whentransactions are shared by multiple parties. The hashing that blockchain technologydelivers in each transaction ensures a high level of security. The hashing associated witheach transaction confirms all sending and receiving transactions. When a transaction issent from one node to another, the other node checks the hash accompanying thetransaction to see if it came from a registered node or an external node. Within theblockchain system, the nodes will check transaction correspondences. The system hasdemonstrated its effectiveness by delivering a more secure messaging system with highcredibility and tamper resistance. In addition, the time it takes to authenticate will be inreal time.
Communication
Baydaa Sh. Z. Abood; Hanan A. R. Akkar; Amean Sh. Al-Safi
Abstract
Compression of images process is a step in the image processing. It is concerned with the transmission and storage of digitally created images. Fractal coding is a potential image and video compression approach with good reconstruction fidelity and relatively large compression ratios, because of its ...
Read More ...
Compression of images process is a step in the image processing. It is concerned with the transmission and storage of digitally created images. Fractal coding is a potential image and video compression approach with good reconstruction fidelity and relatively large compression ratios, because of its simplicity and great performance; fractal image compression (FIC) is a particularly popular approach in image compression applications. However, it has a significant disadvantage in the form of a long encoding time. This is because encoding any small bit necessitates a massive similarity search in the original data As a result; the FIC search time is reduced while the quality of the reconstructed images is maintained acceptable level in many introduced paper and other still a study topic in progress. Fractal images are images that are self-similar in that each individual part is the same as the total. This paper will discusses many attempts for more author that working on image and video compression using fractal compression technique based on various approach and with each discuss focuses on the main parameter of compression such compression ratio (CR), peak signal to noise ratio (PSNR) and encoding time, as well as the details of data set the used for testing also writing with each technique to creating fractal video and image compression.
Control
Ayat Naji Hussain; Sahar Adil Abboud; Basim Abdul baki Jumaa; Mohammed Najm Abdullah
Abstract
Human gait data follows distinct and identifiable patterns that are critical for movement analysis and evaluation Like other biological signals. The success of a rehabilitation program is dependent on the execution of proper progress monitoring. To ensure success, diagnosis of gait anomalies, as well ...
Read More ...
Human gait data follows distinct and identifiable patterns that are critical for movement analysis and evaluation Like other biological signals. The success of a rehabilitation program is dependent on the execution of proper progress monitoring. To ensure success, diagnosis of gait anomalies, as well as the implementation of therapy to address them, must be validated in a constant and timely manner in developing youngsters. In this paper, machine learning techniques were utilized to classify foot diseases and the purpose is to increase the accuracy of disease detection and diagnosis because intelligent systems can contribute significantly in the medical field and have proven their worth in diagnosing many diseases. The results show high accuracy of the used machine learning algorithms, where the accuracy of the classifiers reached 100% for Random Forest (RF), Decision Tree (DT), and k-nearest neighbors (KNN), while it reached 98% for Logistic Regression.
Computer
Adnan T. Kareem; Hasanen S. Abdullah; Ahmed T. Sadiq
Abstract
argumentation has become an attraction recently, because it is widely used in decision-making, at 1994 Dung invented a new argumentation model, called Argumentation Framework AF. This system investigates assaults of arguments, and it also works away on attributes, this model is designed to take care ...
Read More ...
argumentation has become an attraction recently, because it is widely used in decision-making, at 1994 Dung invented a new argumentation model, called Argumentation Framework AF. This system investigates assaults of arguments, and it also works away on attributes, this model is designed to take care of argument attacks among them, without paying attention to how the sentences are formulated or arranged, and identify the supporting and supporting arguments. It is also possible for a group of experts, to evaluate arguments to resolve the debate about the current problem, by determining the extent to which a particular argument affects the other by attacking it, This framework was a comprehensive new system, called the gaming argumentation framework (GAF), It helps make decisions about the current problems, through making Claims and Attack Determinations (CAD) to arguments, and after that, putting the result of those CAD to game theory, with 2 players for the purpose of achieving final results, which are helpful for decision-makers, in making decisions concerning current problems. The present paper gives a proposed system, using the GAF to build the dynamic model based on the gaming argumentation framework (DGAF); it as works as the GAF by adding the feedback to suit all possible conditions, and by making a companion between them, the argumentation and the game theory. Since the foreign exchange market depends on changing conditions, it was a case study.
Computer
Rasha Ismail Ahmed; Rasha Mohammed Mohsin Mohammed Mohsin; Rana Fareed Ghani
Abstract
The rapid growth of the human population and the spread of many bad habits affect the health of human beings, this leads to many health problems, such as heart disease, blood pressure, and diabetes. Some of these diseases require earlier detection and fast treatment, to avoid major risks, such as permanent ...
Read More ...
The rapid growth of the human population and the spread of many bad habits affect the health of human beings, this leads to many health problems, such as heart disease, blood pressure, and diabetes. Some of these diseases require earlier detection and fast treatment, to avoid major risks, such as permanent damage or even life loss. The fast evolution of communications and nanotechnology nowadays is being facilitated to help with saving lives before great damage happens. This paper suggests a special architecture through which to monitor patients remotely using an Internet of Things (IoT)architecture for the purpose of notifying the paramedics and health care centers to rescue the life of cardiovascular patients. The experiments, after attempts with several types of classification algorithms, showed that The result shows that The decision tree has high accuracy for predicting the new heart attack and saving lives before happening of great damage .the result reached between( 83 to 87) percentage, which is a good percentage to avoid the risk of heart attacks and thus reducing death rates.
Computer
Raad Abdul Ameer Qasim; Bashar Saadoon Mahdi
Abstract
Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies ...
Read More ...
Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies to provide high security in encrypting images or any important data and preserving them from loss or hacking. This paper presents a new method to generate a random keychain using genetic algorithm techniques to develop new generations and XOR technology to encrypt digital images. Where the results showed the high efficiency of the encryption method with its ease of use and the preservation of the original image data after decoding with high accuracy and speed in implementing the strategy used. The efficiency of these switches for use has been tested using the National Institute of Standards and Technology (NIST) and the statistical randomness test, and the tests were successfully passed.
Communication
Noora Nazar kamal; Qusay F. Al-Doori; Omar Alani
Abstract
Data theory coding is an excellent and well-known branch of study that has produced various crucial solutionsto the insoluble challenges of safe data transfers. Last improvements in detecting error techniques have resulted in a significant increase in the use of low-density parity-check (LDPC) code to ...
Read More ...
Data theory coding is an excellent and well-known branch of study that has produced various crucial solutionsto the insoluble challenges of safe data transfers. Last improvements in detecting error techniques have resulted in a significant increase in the use of low-density parity-check (LDPC) code to address critical concerns connected to secure data transfer. Until now, decent efforts have been performed on LDPC codes that target low complexity, high performance, and low bit error rate goals. The final aim of this review is to provide a recent literature understanding of modern improvements previously mentioned and in LDPC encoding and decoding (applicative and theoretical) techniques. A comparative scan of many remarkable LDPC decoding algorithms, 5G standard requirements, popular power management methods, and low-energy LDPC design studies is also shown. Lastly, conclusions are presented by outliningkey study results, current concerns, and general thoughts on new research directions possibilities.
Computer
Salah Sabah Abed; Mohammed Natiq Fadhil
Abstract
The most attractive study framework among academics is Software Define Networking Networking SDN, which aims to create the Internet with an architecture- independent architecture that will lead to the most significant advances in the network field. This can solve many network problems to deal with high ...
Read More ...
The most attractive study framework among academics is Software Define Networking Networking SDN, which aims to create the Internet with an architecture- independent architecture that will lead to the most significant advances in the network field. This can solve many network problems to deal with high demand changes and reduce Replenishment, changes and less manual work. Because of the limited architecture of traditional networks, which requires modifications in the basic design, network expansion has been mature and slow. Since 2010, until now, the ODL - OpenDayLight model has been proposed to solve most of the problems that guide network engineers in the process of managing complex high-volume networks by top research-oriented universities around the world. Now is the time to turn dreams into reality by putting the presented ideas into action, which will result in a solution that meets the expectations of the researcher regarding the process of managing complex networks and all forms of networks. This document is an attempt to assist researchers in implementing a software identification network infrastructure on which the research community may focus on further analysis and development. We demonstrated an incremental approach to implementing ODL - OpenDayLight Controller (ODL is a JVM program and can run from any operating system and device as long as it supports Java) from the Software Define Network, as well as creating and executing required scenarios, and illustrate the working nature of ODL - OpenDayLight compared to ryu contrlloer, in this paper Research.
Control
Imad Zuhair; Hasan M Alwan; Hussain M. Al-Khafaji
Abstract
The expert system and artificial intelligence are still important modern technologies. A structure can modify its behavior under dynamic stresses by using active controls. The term "intelligent" or "smart" structures refers to these self-modifying structures. The structural engineering discipline may ...
Read More ...
The expert system and artificial intelligence are still important modern technologies. A structure can modify its behavior under dynamic stresses by using active controls. The term "intelligent" or "smart" structures refers to these self-modifying structures. The structural engineering discipline may experience a revolution thanks to smart structure technologies. Particularly for huge structures, It is anticipated to have major effects. Effects with regard to the avoidance of fatalities and damage to the structure and its contents, particularly with regard to huge buildings that have thousands of elements. An efficient control algorithm to establish the magnitude of the actual forces to be applied to the construction is one of the most critical components in the successful use of smart active control technology. An overview of the primary active control approaches for the reduction of vibration in intelligent mechanical and civil structures that are subject to external dynamic loads is provided in this study. Different control algorithms' benefits and drawbacks are examined. Finally, recent advances in the study of control algorithms are highlighted, including the use of multiparadigm strategies, decentralized control, deep learning techniques applied to neural networks design of controls for sustainability, and a merging of the domains of vibration control and structural health monitoring.
Computer
Yasser A. Yasser; Ahmed T. Sadiq; Wasim AlHamdani
Abstract
Honeywords are fake passwords that are typically companions to the real password “sugarword.” The honeyword technique is a password cracking detection technique that works effectively to improve the security of hashed passwords by making password cracking simpler to detect. The password database ...
Read More ...
Honeywords are fake passwords that are typically companions to the real password “sugarword.” The honeyword technique is a password cracking detection technique that works effectively to improve the security of hashed passwords by making password cracking simpler to detect. The password database will contain many honeywords for each user in the system. A silent alarm will trigger, indicating that the password database has been compromised if the hacker signs in using a honeyword. The honeychecker is a separate server in charge of recognizing the real password and raising the silent alarm. Many honeyword creation techniques have been presented previously. They all have limitations in the generating process, supporting characteristics, and strengths of honeyword. The bees algorithm, an optimization metaheuristic swarm intelligence algorithm, is used in this article to suggest a novel approach for generating honeywords. The proposed bee algorithm succeeded in addressing the limitations of the previous methods by enhancing the honeyword generating process, supporting the honeyword characteristics, and addressing the honeyword system problems. The most important characteristics of the honeyword (flatness, DoS resistance, and storage) were supported by the proposed method to present unconditionally flatness, strong DoS resistance, and moderate storage.
Control
Bashar F. Midhat
Abstract
Temperature control system is a widely applied process since temperature plays a major role in our life starting from room temperature conditioning to various industrial and medical applications. In this paper, a control algorithm is proposed for controlling the temperature of a certain process. Analysis ...
Read More ...
Temperature control system is a widely applied process since temperature plays a major role in our life starting from room temperature conditioning to various industrial and medical applications. In this paper, a control algorithm is proposed for controlling the temperature of a certain process. Analysis is performed to verify the feasibility of the proposed control algorithm. A simulation is performed using MATLAB software to show the performance of the proposed control algorithm and a practical implementation is performed using Arduino to investigate the validity of the analysis. The results show the ability of the proposed controller to achieve the desired results which confirms the validity of the proposed controller and mathematical analysis.
Computer
Yasmin A. Hassan; Abdul Monem S. Rahma
Abstract
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and ...
Read More ...
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously.
Communication
Ghada K. Emad; Soukaena Hassan Hashiem
Abstract
Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission ...
Read More ...
Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for devices with limited computational functions and memory. On the other hand, most lightweight algorithms suffer from a trade-off between complexity and speed to produce a robust cipher algorithm. This paper evaluates the effectiveness of an image encryption technique that uses a Lightweight GIFT algorithm and logistic map equation-based dynamic DNA coding to create a secure, lightweight cipher algorithm for IoT devices. When we employed dynamic DNA coding by the binary bit method, we observed that the developed approach is more secure and has a high level of randomness due to the results. Additionally, the correlation between nearby pixels is approximately zero; there is no association between the two images. Therefore, the developed approach achieves a higher encryption efficiency when compared to the original algorithm.