Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Asus Xtion Pro Camera Performance in Constructing a 2D Map Using Hector SLAM Method

Heba Hakim; Zaineb M. Alhakeem; Ali Fadhil

Volume 21, Issue 3 , September 2021, Page 1-11


  Simultaneously and location mapping (SLAM) is an important technique for achieving a full autonomous navigation system by constructing a 2D map of the surrounding environment. A performance of two popular distance sensor (Asus Xtion Pro Camera and 2D LiDAR) in building a map of the indoor environment ...  Read More ...

Review on Positive Control for Glycemia Regulation in Type One Diabetes

Amer B. Rakan; Taghreed Mohammad Ridha

Volume 21, Issue 3 , September 2021, Page 12-23


  This paper aims to present the literature related to the regulation of Type 1 Diabetes Mellitus (T1DM) via positive control and constrained control. This idea of positive control was derived because the control input (insulin) can only be infused/injected (one direction control). The main operation of ...  Read More ...

Cloud Based Processing of Vibrational Signal for Oil Pipeline Monitoring System

Sabreen J. Siwan; Waleed Fawwaz Shareef; Ahmed Nasser

Volume 21, Issue 3 , September 2021, Page 24-39


  Petroleum is the economic infrastructure in Iraq because it generates a significant portion of the country's revenue and can be considered as the primary source of financial costs each year. As a consequence, it is critical to protect the sector and continue to develop it. Therefore, it is important ...  Read More ...

An Efficient Feature Engineering Method for Fraud Detection in E-commerce

Suha M. Najem; Suhad kadhem

Volume 21, Issue 3 , September 2021, Page 40-52


  With the speedy expansion of e-commerce, credit cards have also become rising vogue, and that makes online transactions sleek and suitable. In conjunction with rising in online transactions, credit card fraud also increasing, which contributes to losses incurred yearly. As a result, many deep and machine ...  Read More ...

Survey on Automatic Revocation Schemes for Cloud Systems

Manahil Sherfi; TajElsir Hassan Suliman; NourEldien A. NourEldien

Volume 21, Issue 3 , September 2021, Page 53-64


  Automatic Revocation means performing the revocation task automatically by the proxy Re-Encryption (PRE), without any command from the data owner. For the lack of survey studies that tackle the automatic Revocation Process, this paper demonstrates a rich survey on the recent auto-revocation schemes proposed ...  Read More ...

Quantitative PID Controller Design using Black Hole Optimization for Ball and Beam System

Ibtihal H. Ibrahim; Hazem I. Ali

Volume 21, Issue 3 , September 2021, Page 65-75


  In this work, the design of a quantitative PID controller is proposed for Ball and Beam system. This controller is designed to robustly compensate for the nonlinear and uncertain behavior of the ball and beam system. The PID controller parameters are obtained using the Black Hole Optimization (BHO) method ...  Read More ...

Blockchain for Authorized Access of Health Insurance IoT System

Iman Mohammed Hasan; Rana Fareed Ghani

Volume 21, Issue 3 , September 2021, Page 76-88


  Today's insurance industry plays a significant role in a variety of fields, particularly in health insurance. As IoT technology advances, health insurers in IoT networks can obtain real-time medical data for individuals and issue individual insurance policies based on a person's lifestyle. However, sharing ...  Read More ...

The Use of the Moore-Penrose Pseudoinverse for Evaluating the RGA of Non-Square Systems

Rafal Al Yousuf; Jeffrey Uhlmann

Volume 21, Issue 3 , September 2021, Page 89-97


  A recently-derived alternative method for computing the relative gain array (RGA) for singular and/or non-square systems has been proposed, which provably guarantees unit invariance. This property is not offered by the conventional method that uses the Moore-Penrose (MP) pseudoinverse. In this paper, ...  Read More ...

Impostor Detection Based Finger Veins Applying Machine Learning Methods

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 3 , September 2021, Page 98-111


  Finger veins are different from other biometric signs; it is a special characteristic of the human body. The challenge for an imposter to explore and comprehend it, since the veins are below the skin, it is impossible to tell which one is, and which one stands out because the person has more than one ...  Read More ...

Impostor Recognition Based Voice Authentication by Applying Three Machine Learning Algorithms

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 3 , September 2021, Page 112-124


  As compared to other conventional biometrics systems, voice is a unique and important metric, where it is used in many vital fields as the security and communication domains that do not need to be expensive to achieve. The purpose of this article is to see how machine learning (ML) algorithms perform ...  Read More ...