Kawther Dawood Salman; Ekhlas Kadum Hamza
Volume 21, Issue 2 , June 2021, Page 1-15
Abstract
Wireless Fidelity (Wi-Fi) is particularly popular today. Every place hashotspots to access the internet via Wi-Fi, including homes, offices, colleges, and otherpublic places. This increased number of users, and hence the use of bandwidth, has led toradio spectrum congestion. Thus, in the year of 2011, ...
Read More ...
Wireless Fidelity (Wi-Fi) is particularly popular today. Every place hashotspots to access the internet via Wi-Fi, including homes, offices, colleges, and otherpublic places. This increased number of users, and hence the use of bandwidth, has led toradio spectrum congestion. Thus, in the year of 2011, Light-Fidelity (Li-Fi) wasintroduced, which applies a visible light region for data transmission, to solve this radiocrisis problem. This visible part of the spectrum was 10,000 times big compared to thepart utilized in the Wi-Fi radio. Furthermore, Li-Fi was a sub-set of Visible LightCommunication (VLC), using Light-Emitting Diode (LED) bulbs for transmitting datautilizing light-medium. This paper reviews the differences between Li-Fi technology andwireless types. It Also focuses on the architecture, components, functioning, modulationtechnologies, and applications of Li-Fi.
Sarah M. Al-sudany; .Ahmed S. Al-Araji1; Bassam M. Saeed
Volume 21, Issue 2 , June 2021, Page 16-35
Abstract
This research presents a study for multicore Reduced Instruction SetComputer (RISC) processor implemented on the Field Programmable GateArray(FPGA).The Microprocessor without- Interlocked Pipeline Stages (MIPS)processor is designed for the implementation of educational purposes, as well as it isexpected ...
Read More ...
This research presents a study for multicore Reduced Instruction SetComputer (RISC) processor implemented on the Field Programmable GateArray(FPGA).The Microprocessor without- Interlocked Pipeline Stages (MIPS)processor is designed for the implementation of educational purposes, as well as it isexpected that this prototype of processor will be used for multimedia or big dataapplications. 32- bit MIPS processor was designed by using Very High speed HardwareDescription Language (VHDL). Pipelined MIPS processor contains three parts that are :data path 32-bit MIPS pipeline, control unit, and hazard unit. The single cycle MIPSsystem was subdivided into five pipeline stages to achieve the pipeline MIPS processor.The five parts include: instruction fetch (IF), Instruction Decode (ID), execution (EXE),memory (MEM) and Write Back (WB). Three types of hazard: data hazard , controlhazard and strctural hazard are resolved. Certain components in the pipelined stage forthe design processor were iterated for four core SIMD pipelined processors. The MIPS isdeveloped using Xilinx ISE 14.7 design suite. The designed processor was implementedsuccessfully on Xilinx Virtex-6 XC6VLX240T-1FFG1156 FPGA. The total poweranalysis of multi-core MIPS processor is obtanined 3.422 watt and the clock period was7.329 ns (frequency: 136.444MHz).
Mahmoud M. Mahmoud; Ahmed R. Nasser
Volume 21, Issue 2 , June 2021, Page 36-43
Abstract
Object detection of autonomous vehicles presents a big challenge forresearchers due to the requirements of accuracy and precision in real-time.This work presents a deep learning approach based on a dual architecturedesign of the network. A highly accurate multi-class network of convolutionalneural networks ...
Read More ...
Object detection of autonomous vehicles presents a big challenge forresearchers due to the requirements of accuracy and precision in real-time.This work presents a deep learning approach based on a dual architecturedesign of the network. A highly accurate multi-class network of convolutionalneural networks (CNN) is presented for input data classification. A Region-Based Convolutional Neural Networks (Faster R-CNN) network with a modifiedFeature Pyramid Networks (FPN) is used for better detection of tiny objects andYou Only Look Once (YOLOv3) network is used for general detection. Eachnetwork independently detects the existence of an object. The decision maps arethen fused and compared to decide whether an object is present or not. FasterR-CNN with FPN model reported a higher intersection over Union (IoU) andmean average precision (mAP) than the YOLOv3. This approach is reliabledemonstrating an upgrade on the existing state-of-the-art methods of fullyconnected networks.
Omar Abdul Razzaq Abdul Wahhab; .Ahmed S. Al-Araji1
Volume 21, Issue 2 , June 2021, Page 44-58
Abstract
The goal of navigating a mobile robot is to find the optimal path to direct itsmovement, so path planning is the best solution to find the optimal path. Therefore, thetwo most important problems of path planning must be solved; the first is that the pathmust avoid collision with obstacles, and second ...
Read More ...
The goal of navigating a mobile robot is to find the optimal path to direct itsmovement, so path planning is the best solution to find the optimal path. Therefore, thetwo most important problems of path planning must be solved; the first is that the pathmust avoid collision with obstacles, and second it must reduce the length of the path to aminimum. This paper will discuss finding the shortest path with the optimum cost functionby using the Chaotic Particle Swarm Optimization (CPSO), and A*, compare the resultsbetween them and the proposed hybrid algorithm that combines A* and Chaotic ParticleSwarm Optimization (ACPSO) algorithms to enhance A* algorithm to find the optimalpath and velocities of the wheeled mobile robot. These algorithms are simulated byMATLAB in a fixed obstacles environment to show the effectiveness of the proposedalgorithm in terms of minimum number of an evaluation function and the shortest pathlength as well as to obtain the optimal or near optimal wheel velocities.
Areej Munadel Kadhum; Ekhlas Kadum Hamza
Volume 21, Issue 2 , June 2021, Page 59-69
Abstract
with the introduction of new standards at a fast pace, wireless communicationis experiencing great development and growth, thereby raising the level of demand forradio spectrum. The spectrum, however, is a limited resource and cannot be subdividedindefinitely to satisfy any use. As a result, spectrum ...
Read More ...
with the introduction of new standards at a fast pace, wireless communicationis experiencing great development and growth, thereby raising the level of demand forradio spectrum. The spectrum, however, is a limited resource and cannot be subdividedindefinitely to satisfy any use. As a result, spectrum scarcity arises. This scarcityrepresents the main problem that faces the future of wireless networks. This scarcity isdue to the inefficient fixed spectrum allocation technique. The Dynamic Spectrum Access(DSA) is a successful solution to reduce the spectrum scarcity that wirelesscommunications currently face. DSA allows users without a spectrum license known asSecondary Users (SUs) to temporarily use the unused licensed spectrum. This workfocuses on analysis, and design of the Cognitive Radio (CR) system forOrthogonalFrequency Division Multiplexing modulation. The OFDM transceiver system has beenimplemented in the first stage using the Quadrature Phase Shift Keying (QPSK)modulation technique by Xilinx System Generator Inter-Symbol InterferenceSimulink(XSG) based on MATLAB. The second stage of the proposed system is to design energydetection of the OFDM transceiver. This system was analyzed under the Adaptive WhiteGaussian Noise (AWGN) channel based XSG. In this work, the energy detector is alsodesigned using the XSG ISE14.1 Simulink and obtained all the signals successfully.
Taha Adel Al-Gadery; Shibly Ahmed Al-Samarraie
Volume 21, Issue 2 , June 2021, Page 70-84
Abstract
In this paper, we study the Sliding Mode Extremum Seeking (SMES)optimization method for a Heat Exchangers Network. The studied network is constructedfrom plate Heat Exchangers, in which several thermal sources are used to heat a commoncold stream that is distributed between the several branches of the ...
Read More ...
In this paper, we study the Sliding Mode Extremum Seeking (SMES)optimization method for a Heat Exchangers Network. The studied network is constructedfrom plate Heat Exchangers, in which several thermal sources are used to heat a commoncold stream that is distributed between the several branches of the network. Theconsidered optimization problem is the optimization of the thermal power gained fromdifferent hot sources. The control variables are the split ratios of the cold stream to thedifferent heat exchangers. The dynamical model for general Heat Exchanger Networkwith (n) Heat Exchangers was driven and the special case of two Heat Exchangers inparallel was considered as a case study. The SMES algorithm was modified with anintegral anti-windup scheme to constrain the search within the admissible region. Thesimulation results obtained by using Matlab program confirmed the effectiveness of theapproach.
Mohammed I. Berbek; Ahmed A. Oglah
Volume 21, Issue 2 , June 2021, Page 85-101
Abstract
today The topic of contention is the quality of computer networkservice. Efficient data handling is important. Each router offers a buffer spacewhere packets can be held before being sent until they are processed. Thetheory of packet congestion control is TCP (Transmission Control Protocol).(AQM) is ...
Read More ...
today The topic of contention is the quality of computer networkservice. Efficient data handling is important. Each router offers a buffer spacewhere packets can be held before being sent until they are processed. Thetheory of packet congestion control is TCP (Transmission Control Protocol).(AQM) is a mechanism proposed for gateways to improve congestionmanagement. AQM (active queue management) is a crucial to minimize packetloss in TCP/IP networks and improving network efficiency. This paper offers ahybrid intelligent (PID) with type1 fuzzy logic controller which is designed todecrease network congestion. As a router (AQM), social spider optimization(SSO) is used to tune the control parameters used to reduce queue size error.The designed controller based on SSO algorithm provides a good trackingperformance for AQM desired value.The observational findings indicated ahigh-performance increase in the proposed process. In MATLAB(R2020a), asimulation of a linearized TCP/AQM model is presented. NS2 is used to performverification for the fuzzy logic controllers for the nonlinear TCP/AQM modelunder a more practical simulation and to analyze and examine networkbehavior in different scenarios.
Ibrahim Malik ALattar; Abdul Monem S Rahma
Volume 21, Issue 2 , June 2021, Page 102-114
Abstract
This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle ...
Read More ...
This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle message length. The proposed work has been done by using two extrarounds and depending on round statuse ( even or odd) , messages are detectedto be used. The key is placed in agreed positions, then the remaining positionsare filled with the message, and then certain sums are calculated to representthe encrypted text. Speed, complexity, histogram calculations for images, andNIST calculations for texts were calculated, and the results were compared,where the complexity of the algorithms was as follows ((P)15 × (256)10)2 × (P)11× (256)14 and ((256)15 × (256)10)2 × (256)11 × (256)14 for GF(P) and GF(28)respectively , From that, it has been discovered that the proposed algorithm(Magic Square of order five with multi message length) is better than the rest ofthe algorithms as it has excellent complexity and a slight difference in thespeed.
Huda Ghazie Abd UL Sahib; Maisa Abid Ali Khodher
Volume 21, Issue 2 , June 2021, Page 115-131
Abstract
This paper will present a comparison between three proposed methods. All of these methodsinclude hiding a secret message inside a video for the aim of transferring it to another party with highsecurity and a high embedding rate in order to ensure that the secret message is not discovered by theattacker. ...
Read More ...
This paper will present a comparison between three proposed methods. All of these methodsinclude hiding a secret message inside a video for the aim of transferring it to another party with highsecurity and a high embedding rate in order to ensure that the secret message is not discovered by theattacker. In addition , facilitating deals with video frames as large data for the purpose of analyzing,dividing and controlling frames easily by the programmer, using the MapReduce method. This isdone by dividing the video into a series of frames, and before the hiding process, the message isencrypted using the advance encryption standard (AES) algorithm. These basic processes areimplemented in all three proposed methods, the rest of the details for each method are:The first method: used the pixel value difference (PVD) algorithm to hide the secret message in thevideo. In addition, the stego secret key was also used. This key is used for the purpose of deciding thelocations of the pixels that will be employed to hide the secret message inside it.The second method: the MapReduce principle is used for the purpose of facilitating dealing withvideo frames. The chosen frame will enter the MapReduce stages. This is implemented by dividing theframe into three matrices red, green, blue (RGB). Each matrix represents a map. Moreover, thetechnique that is used for concealment is the least significant bit (LSB) technology which uses thestego secret key (x2) for the purpose of selecting sites that will be hidden by it.The third method: Also, the MapReduce principle is used, but this method is implemented by dividingthe frame into four blocks. Each block represents a map. In one of the stages of the MapReduce, thehiding process will be done by using the (PVD) method which uses the stego secret key (n+15).Finally, the reducer, which is the last stage, will collect the results of each block to generate thestego-frame.The results of the three methods are efficiency, transparency, robustness and powerful in stegovideo. It is noticed that the second method has achieved the lowest capacity, thus achieving highsecurity. As for the third method, it achieved the highest capacity and the highest execution time wasthe first method. Despite this, all the three methods have achieved high security. The attacker orunauthorized person cannot detect any suspicious differences in a stego video. These results areobtained through using many measurements: peak signal-to-noise ratio (PSNR), Mean Squared Error(MSE), Entropy and correlation coefficient.
Sura Sabah Rasheed; Ahmed T. Sadiq
Volume 21, Issue 2 , June 2021, Page 132-142
Abstract
Social media have been increasing obviously and widely due to the fact that it is a mediafor users who express their emotions using reviews and comments on a variety of areas in life. In thepresent study, a modest model has been suggested for the assessment of service departments with theuse of reviews ...
Read More ...
Social media have been increasing obviously and widely due to the fact that it is a mediafor users who express their emotions using reviews and comments on a variety of areas in life. In thepresent study, a modest model has been suggested for the assessment of service departments with theuse of reviews and comments in social media pages of those departments from various governorates.The utilization of the text mining for the sentiment classification has been used through collectingIraqi dialect reviews on service department pages on Facebook to be analyzed with the use of thesentiment analysis to track the emotions from the comments and posts. Those have been classifiedafter that to positive, neutral or negative comment with the use of the algorithms of Naive Bayesian,Rough Set Theory, and K-Nearest Neighbors. Out of 13 Iraqi capital (Baghdad) service departmentshave been tackled, it has been found that 11% of those departments had very good assessment, 18%from these service departments have good assessment, 21% from these service departments havemedium assessment, 24% from these service departments have acceptance assessment and 26% fromthese service departments have bad assessment. The results of the evaluation showed the poorservices provided by service departments in the capital Baghdad. Experimental results were helpfulfor the service departments in improving their work and programs had responded quickly andsufficiently to the customer demands.