Shibly Ahmed AL-Samarraie; Shaymaa Mahmood Mahdi; Taghreed M. Mohammad Ridha; Mustafa Hussein Mishary
Volume 15, Issue 3 , December 2015, Page 1-10
Abstract
Abstract – This paper deals with the problem of designing a robust controller for the
electro-hydraulic position servo system (EHPSS). The sliding mode control design
methodology is utilized here to design a robust controller with respect to system
parameters uncertainty. Because the relative degree ...
Read More ...
Abstract – This paper deals with the problem of designing a robust controller for the
electro-hydraulic position servo system (EHPSS). The sliding mode control design
methodology is utilized here to design a robust controller with respect to system
parameters uncertainty. Because the relative degree of the mechanical sub-system with
respect to hydraulic force
Fatin I. Telchy; Safanah Rafaat
Volume 15, Issue 3 , December 2015, Page 11-24
Abstract
Abstract –Job-Shop Scheduling (JSS) processes have highly complex structure in
terms of many criteria. Because there is no limitation in the number of the process and
there are many alternative scheduling. In JSS, each order that is processed on different
machines has its own process and process ...
Read More ...
Abstract –Job-Shop Scheduling (JSS) processes have highly complex structure in
terms of many criteria. Because there is no limitation in the number of the process and
there are many alternative scheduling. In JSS, each order that is processed on different
machines has its own process and process order. It is very important to put these
processes into a sequence according to a certain order. In addition, some constraints
must be considered in order to obtain the appropriate tables.
In this paper, a 3-layers Feed Forward Backpropagation Neural Network (FFBNN) has
been used for two different purposes, the first one task is to obtain the priority and the
second one role is to determine the starting order of each operation within a job.
Precedence order of operations indicates the dependency of subtasks within a job,
Furthermore, the combined greedy procedure along with the back propagation algorithm
will align operations of each job until best solution is obtained. In particular, greedy
type algorithm will not always find the optimal solution. However, adding a predefined
alignment dataset along with the greedy procedure result in optimal solutions.
Dr. Israa Tahseen Al-attar
Volume 15, Issue 3 , December 2015, Page 25-37
Abstract
Abstract – Mobile Ad Hoc Network (MANET) is a collection of multi-hop
wireless mobile nodes that communicate with each other without centralized control or
established infrastructure. MANETs has a wide range of applications, ranging from
mobile phone application to military applications. As the ...
Read More ...
Abstract – Mobile Ad Hoc Network (MANET) is a collection of multi-hop
wireless mobile nodes that communicate with each other without centralized control or
established infrastructure. MANETs has a wide range of applications, ranging from
mobile phone application to military applications. As the application of MANETs
increases, the attacks on MANETs also increase. Due to mobility of nodes, frequent link
breakage carry out, and it's widely use, MANET’s routing is considered as a challenging
job. A vast range of research is being conducted to keep routing in MANETs robust and
secure. One of the major research areas is routing privacy. This paper presents a
description of routing protocols that have the major challenges in ad hoc networks with a
particular focus on their characteristics, functionality, and security features and makes
their comparative analysis. Further, this study will help the researchers to get an
overview of the existing protocols and suggest which protocols may perform better with
respect to varying network scenarios.
Dr. Hassan Jaleel Hassan
Volume 15, Issue 3 , December 2015, Page 38-46
Abstract
Abstract – Image identification plays a great role in industrial, remote sensing, and
military applications. It is concerned with the generation of a signature to the image.
The human iris recently has attracted of biometric-based identification and verification
research and development community. ...
Read More ...
Abstract – Image identification plays a great role in industrial, remote sensing, and
military applications. It is concerned with the generation of a signature to the image.
The human iris recently has attracted of biometric-based identification and verification
research and development community. This iris is so unique that no two irises are alike,
even among identical twins in the entire human population.
In this work we propose a security system based on Iris biometric feature extraction.
The focus was on the eye image, which is devoid of the eyelid and eyelashes that is
done by using a camera which has the ability to show the iris with white background
(eye sclera) only, using a proper position of eye on camera. The system automatically
acquires the biometric data in numerical format (Iris images) by using a properly
located sensor. We are considering camera as a high quality sensor. Iris images are
typically color images that are analyzed to three bands monochrome images (Red,
Green, and Blue). Each band of monochrome image represents a grey scale image. Then
the feature extraction algorithm is used to detect Iris Effected Region (IER) for each
monochrome image, and then extract features from IER that are numerical
characterization of the underlying biometrics. Later we identify the authorized person
by comparing the features obtained from the feature extraction algorithm with the
previously stored features by producing a similarity score. This score indicates the
degree of similarity between a pair of biometrics data under consideration. Depending
on degree of similarity, authorized person can be identified.
A successful identification rate of 100% was achieved for ten person iris images.
Assist. Prof. Suhad M. Kadhem; Yasir R. Nasir
Volume 15, Issue 3 , December 2015, Page 47-63
Abstract
Abstract –The Example Based Machine Translation (EBMT) system retrieves
similar examples (pairs of source phrases, sentences, or texts and their translations) from
a database of examples, adapting the examples to translate new input. The Example Base
(EB) is an important component in an EBMT system. ...
Read More ...
Abstract –The Example Based Machine Translation (EBMT) system retrieves
similar examples (pairs of source phrases, sentences, or texts and their translations) from
a database of examples, adapting the examples to translate new input. The Example Base
(EB) is an important component in an EBMT system. It handles the storage to support the
translation process. Thus, an efficient EB must be capable of handling a massive volume
of examples at an adequately high speed.
In this research, a new approach to reduce the redundancy problem that some EBMT
systems suffer from is suggested by designing EB using B+ tree. The EB is used to store
the examples of a particular field in a manner that reduces the redundancy of these
examples (or even sub examples) in order to provide efficient memory usage and to
minimize the search time. The lexicon of the proposed method is represented by using
two databases. One database is used for storing the English words and another database is
used for storing the English transfer grammars.
Ali Y. Fattah; Falah Hasan Abdul-Baqi
Volume 15, Issue 3 , December 2015, Page 64-76
Abstract
Abstract –High-capacity and long-haul transmission technologies are indispensable
to develop cost-effective optical transport networks. Optical communication is rapidly
advancing toward 1-Tera bit per second (Tb/s) and beyond transport. As the available
bandwidth of Standard Single-Mode Fiber (SSMF) ...
Read More ...
Abstract –High-capacity and long-haul transmission technologies are indispensable
to develop cost-effective optical transport networks. Optical communication is rapidly
advancing toward 1-Tera bit per second (Tb/s) and beyond transport. As the available
bandwidth of Standard Single-Mode Fiber (SSMF) is limited, high Spectral Efficiency
(SE) becomes an important issue. Coherent Optical Orthogonal Frequency-Division
Multiplexing (CO-OFDM) has become one of the promising candidates due to its high
SE and resilience to linear channel impairments such as Chromatic Dispersion (CD).
In this paper, based on Optisystem 11.0 software simulation platform, the performance
of a 1.6 Tb/s (16 x 100 Gb/s) PDM-CO-OFDM transmission system is investigated
invest by using QPSK modulation format and applying Polarization Interleaving
Scheme (PIS) over 1440 km with 2 b/s/Hz spectral efficiency.
Asst. Prof. Dr. Luma Fayeq Jalil; Prof.Dr. Hilal Hadi Saleh; Ekhlas Abass Albhrany
Volume 15, Issue 3 , December 2015, Page 77-89
Abstract
Abstract- Chaotic systems have numerous properties, for example: mixing property,
sensitivity to initial conditions parameters, structural complexity and deterministic
dynamics. These properties were investment in the last decade for cryptographic
applications and developments of pseudorandom number/bit ...
Read More ...
Abstract- Chaotic systems have numerous properties, for example: mixing property,
sensitivity to initial conditions parameters, structural complexity and deterministic
dynamics. These properties were investment in the last decade for cryptographic
applications and developments of pseudorandom number/bit generator. The paper propose
new pseudorandom number (bits) generator (PRNG) based on the Jacobian elliptic chaotic
maps and standard map. The principle of the method consists in generating binary sequence
from elliptic chaotic maps of cn and sn types. These sequence positions is permuted using
standard map. The performance of the generator is studied through conventional statistical
methods and also using the NIST test suite. The results show that the produced sequences
possess high randomness statistical properties and good security level which make it
suitable for cryptographic applications.