Volume 17, Issue 1, Autumn 2017, Page 1-82
Implementation of Wireless Area Network for Patient Monitoring System
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 1-9
There are many critical cases in which the patients need continuous monitoring by the medical staff. Implementing wireless sensor network in medical field helps the medical staff to monitor the patients remotely. This system is designed to collect the patient’s physiological parameters, and store them in the database. The doctor monitors the patient continuously in real time. In this project the biomedical sensor nodes used are temperature and heart rate sensors; Arduino UNO is used as a microcontroller for data processing, and then the messages are transmitted to the base station via Bluetooth wireless technology. The Raspberry Pi is used as a system personal server. The results, reports and other information related to the patients are displayed in website pages which are suitable for the desktop, Personal Digital Assistance (PDA) and mobile devices.
Drip Irrigation Scheduling System Using Sensor Network
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 10-23
The agriculture is vulnerable and sensitive to climate changes. These changes reduce the production while encouraging the growth of bush, which lead to water consumption extravagantly. In this paper, we proposed an automatic drip irrigation system based on calculating the required crop water and irrigation depth. The aim of the proposed system is to automatically compute irrigation scheduling of certain crop according to a crop type and climatological conditions. This system includes two parts: hardware and control center. The sensors send their real-time readings of the soil moisture and climatic information to the monitoring part of the system wirelessly and then save them in database server. The hardware part consists of a main unit represented by ARDUINO Uno and sensors of soil moisture and DHT11. The wireless communication link between the hardware and control center parts are covered using Bluetooth HC-06. In the control center, the database is built using SQL server 2015 and the related Graphical User Interface (GUI) frames is designed using Visual Studio C#. The proposed system has been presented in a prototype to represent the case study and the obtained results show a clear reduction of power and water consumption.
Depth Estimation and Shape Reconstruction of a 2D Image Using N.N. and Bézier Surface Interpolation
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 24-32
Inferring 3D image from 2D image is an advance topic in computer vision. This article considers a 2D image depth estimation of an object and reconstructs it into a 3D object image. The 2D image is defined by slices, where each slice contains a set of points that are located along the object contour and within the object body. The depths of these slices are estimated using the neural network technique (N.N.), where five factors (slice length, angle of the incident light and illumination of some of points that located along the 2D object, namely control points) are used as inputs to the network. The estimated depths of the slices are mapped into a 3D surface using the interpolation technique of the Bezier Spline surface. Our model was tested and evaluated using different objects with different and complex shapes. The results showed an effective performance of the proposed approach.
Proposed Pseudo Random Generator Based on RC5 Block Cipher
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 33-41
Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic primitives. This paper presents a 64-bit random number generator with a high generation speed and a good random sequences by employing the RC5 encryption algorithm round functions with some changes in the usage
of the key, where two keys have been used with an initial vector to start the sequence generator. This generator can be used as a keys generator for any security system or to generate an intermediate password for signing process, and it can be adapted in many other applications, such as random pattern generation, games, etc. Examining the sequences shows great results in terms of randomness and security by achieving a difference near 0.5, this value is the best result, and a high undependability on the previous generated sequences by also achieving a difference more than 0.5, frequency, serial and run test came out with a near optimality results.
Convolutional Code Constraint Length over Rayleigh Fading Channel: Performance Evaluation and Hardware Aspects
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 42-48
In this paper, the performance of convolutional code constraint length for bandwidth efficient transmission over AWGN and Rayleigh fading channels is presented. Using intensive simulation and in terms of BER error floor, we evaluate the performance of binary phase shift keying (BPSK) mapping scheme. In addition, the hardware implementation considerations based on the Digital Signal Processor (DSP) platform of convolutional decoding are discussed. To be more specific, the code constraint length effect on both memory management and clock cycles are considered.
Echo Cancellation in Telecommunications Using Variable Step-Size, Dynamic Selection, Affine Projection Algorithm.
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 49-58
This paper focuses on how to improve the performance of Acoustic Echo Cancellation AEC in voice communication systems. A variable step-size, dynamic affine projection algorithm named as DSVSSAPA is devised for this purpose. The proposed version combines the merits of the variable step size APA as well as uses dynamic selection of the input vectors to reduce its computational power, which has not been found in literature elsewhere. The version proposed in this paper overcomes drawbacks incorporated with the standard AP algorithm. These drawbacks are convergence speed-misalignment trade off problem and the high computational complexity of the algorithm. The proposed algorithm reduces the computational complexity by carrying the update after satisfying a specific criterion. Performance of the proposed echo canceller is evaluated and compared with those obtained from the same echo canceller but based on conventional algorithms such as the normalized least mean square algorithm NLMS and the original affine projection algorithm APA. The performance is measured in terms of misalignment and echo return loss enhancement ERLE. Simulation results showed superior ERL performance of the DSVSSAPA compared to other algorithms. It also achieves 17.73% reduction in computational complexity compared with conventional APA which is useful in portable communication applications.
Design a Hybrid Cryptosystem Based Chaos and Sharing for Digital Audio
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 59-70
With the growth rate of wireless communication with internet and
multimedia. The wireless network has expanded their applications in our life.
Cryptography and steganography play important role within data security. This
paper chiefly produces a novel hybrid cryptography and steganography for
digital audio base chaos system and secret sharing scheme algorithm. These
algorithms have multilevel of processing with the digital audio to increase the
level of security. In this algorithm, digital audio was encrypted with a novel
encryption method based Lorenz chaos map. Then, divide the encrypted audio
to N encrypted audio based on secret sharing scheme. Finally, hiding N
encrypted audio in N cover images with chaos system process. The result shows
that the algorithm for audio encryption have a high degree of confidence, large
key space reached more than 2672 possible of a key, key sensitivity, and high
quality of recovered digital audio. Chaos system and secret sharing process
with multi-cover images offers additional space, security for the secret audio
message, and quality for cover images. The power signal to noise ratio of cover
images reached to 57db with embedding 334 KB of secret audio with four cover
images.
Design of a Continuous Sliding Mode Controller for Path Tracking of an Articulated Vehicle
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2017, Volume 17, Issue 1, Pages 71-82
This article presents design and evaluation of a sliding mode control scheme,
being applied to the case of an articulated vehicle. The proposed Sliding Mode Controller
(SMC) is based on a continuous sliding surface, being introduced for reducing the
chattering phenomenon, while achieving a better tracking performance and a fast
minimization of the corresponding tracking error. The derivation of the sliding mode
controller relies on the fully nonlinear kinematic model of the articulated vehicle, while the
overall stability of the control scheme is proven based on the Lyapunovs stability condition.
The performance of the established control scheme is evaluated through circle path
tracking scenario on a small-scale articulated vehicle