Print ISSN: 1811-9212

Online ISSN: 2617-3352

Issue 1,

Issue 1


Image files formats and Measuring Image Quality A comparative study and analysis of commonly used image file formats

Al-kenany S.H

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 110-126

Abstract:
The core objectives of this research are to identify, understand and describe
range of workable–based methods for quantitatively measuring the quality of an image
represented in various file formats. Moreover, it suggests methods for measuring an
image quality in varied graphic file formats. The research describes current popular and
available graphic file formats, and the compression methods are utilized as well as color
spaces, etc. The type of image display in use also affects the visual appearance of
images. Furthermore, the lower depth output and use of colors fail affects the
magnification features.

An Error Concealment Algorithm Using Discrete Wavelet Transform

Atheer A. Sabri

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 75-87

Abstract:
A new algorithm for error concealment of a completely lost blocks using the 1-D
discrete wavelet transform is proposed in this paper. The transmission of block-coded
images, fading in wireless channels can cause errors in entire blocks and consequently
causes the loss of information of the block. Instead of using common retransmission
query protocols, the error block is substituted for pixel values of the neighborhood of
the lost block.
The proposed algorithm does not require a DC estimation method. While most of the
previously error concealment methods assume that the DC value is available or DC
estimation is required.

A New Design for Linear Phase IIR Digital Filter with Efficient Realization

Dr.Jassim M.Abdul-Jabbar; Afaf A.Abood AL-Dearawy

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 29-41

Abstract:
Linear phase requirement can be achieved by direct design with an FIR filter at
the expense of high order and high computational burden for the given specification.
Alternatively, IIR digital filters can be designed with much smaller order than their FIR
counterparts, but at the expense of the non-linear phase. In this paper, a new design of
linear phase IIR digital filter is presented by composing a zero phase efficiently
designed FIR digital filter with maximally flat group delay. The new IIR digital filter is
designed with a lower order satisfying the same roll-off magnitude response of the
corresponding FIR filter and preserving the approximate pass-band characteristics.

Detection of Code – Division Multiple Access Signals based on Neural Network

ad AL-Shaban; Dr. Sa

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 88-93

Abstract:
Artificial Neural Networks are employed for demodulation of spread spectrum
signals in a multiple – access environment. In fact, the conventional matched filter
receiver, when used in multi-user system, suffers from the interfering signals, so that
when reducing this problem, we need to make the receiver in optimum state. This
receiver is too complex for practical use. Two simple structures employing multilayer
nodes are produced for demodulation of spread-spectrum signals. The Neural Networks
are trained for the demodulation of signals by using back propagation type algorithms.
A comparative analysis of the two receivers, the conventional and that employing
Neural Network, has been presented.

Systolic Digital Filter Architecture for Signal Identification

A. K. Sharief; Prof. Dr. W. A. Mahmoud

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 58-64

Abstract:
The concern of the paper is to use novel approach to identify the signal. The approach
represents the relation ship between the input and output through the systolic array
structure, and drivers the relation directly from the transfer function of the digital filter, so
that signal identification can be effectual in real-time. The paper proposes a one-dimension
(1-D) systolic array architecture of infinite and finite impulse response (IIR &FIR) digital
filters. The proposed architecture is employed in real-time signal identification .This was
verified after the identification process of the signal in real-time by applying the proposed
structure in simulink.

Genetic Algorithm and Elman Network Used For Tuning The Parameters Of The PID Neural Controller Based Model Reference

Mr. Ahmed Sabah Abdul Ameer Al-Araji

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 94-109

Abstract:
A neural network-based self-tuning PID controller is presented. The scheme of
the controller is based on using a modified Elman recurrent neural network as a selftuner
for (PID) controller. The proposed method has the advantage of not necessarily
using a combined structure of identification and decision, common in a standard selftuning
controller, because it uses a genetic algorithm based model reference. The paper
explains the algorithm for a general case, and then presents a specific application on
non-linear dynamical plant.

A Proposed Firewall Security Method against Different Types of Attacks

Prof. Dr. Alaa AL-Hamami; Soukaena Hassan Hashem

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 65-74

Abstract:
There are measures that can be taken to protect users from objectionable or
inappropriate Internet content and secure the LAN from theft, modification, or deletion
of data. Firewall is one of many security measures that can be used to protect networks.
Although firewalls are powerful, they suffer from many types of attacks.
This paper concentrates on one particular aspect, which is providing firewalls
security against five types of attacks. These attacks are: SYN Flooding, Ping of Death,
IP Address Spoofing, Impersonate one-half of a Session and Session Hijacking. This
can be done by building a specific strategy for a firewall; a strategy that has three
procedures, some of which could be stood for more than one attack.

SECURITY SERVICES PROVISION AND ENHANCEMENT IN CLIENT/SERVER NETWORKS USING AES

Dr. SIDDEEQ Y. AMEEN

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2005, Volume 5, Issue 1, Pages 42-57

Abstract:
The paper attempts to provide most of the well-known security services through a
design and implementation of a client/server-based network security system. The system
is based on recommendation of the Advanced Encryption Standard (AES) together with
some secure techniques. These techniques include message digest (MD5), data
compression, data scrambling, traffic padding, novel PN sequence generator that is based
on AES and the RSA for secure key distribution.
The generator is based on the standard ANSI X9.17 with triple AES instead of
triple DES. Recommended statistical tests are carried out to check the randomness of the
new generator. The results of these tests show that the new generator passes all the
required tests successfully. The latter results being even better than those achieved by the
standard generator ANSI X9.17 using AES or triple DES.
Finally, the security system was implemented and tested between two PCs in a
local area network. The results clearly demonstrate the successful operation of the
security system through the secure transmission of data. The security of the proposed
system is shown to be efficient since all the combined techniques are well-established
and recommended. Furthermore, with the multi-keys required to perform the operation,
the tasks of cryptanalyst with available computing power will be difficult.