Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Number of Articles: 12
Volume 22, Issue 2 , June 2022, Page 1-12
AbstractCryptographic approaches based on chaos theory provide a several new and promising avenues for developing safe picture encryption solutions. This paper aims to complicate the process of decrypting images by adding encryption with keys, this was achieved by applying the principle of the 3D-chaotic system ... Read More ...
Volume 22, Issue 2 , June 2022, Page 13-26
AbstractResearchers have extensively utilized optical orthogonal frequency division multiplexing (O-OFDM) in visible light communication (VLC) to achieve high data rate transmission for free spectrum bandwidth. The peak-to-average power ratio (PAPR) is the critical challenge for VLC systems-based O-OFDM that ... Read More ...
Volume 22, Issue 2 , June 2022, Page 27-39
AbstractText summarization can be utilized for variety type of purposes; one of them for summary lecture file. A long document expended long time and large capacity. Since it may contain duplicated information, more over, irrelevant details that take long period to access relevant information. Summarization ... Read More ...
Unknown Input Observer-Based Decentralized PID- BFO Algorithm for Interconnected Systems Against Fault Actuator
Volume 22, Issue 2 , June 2022, Page 40-52
AbstractThis article presents a decentralized controller/observer for nonlinear large- scale interconnected systems with actuator fault. The proposal integrates a robust proportional-integral-derivative (PID) controller with the unknown input observer (UIO) to achieve closed-loop robustness against the interactions ... Read More ...
Volume 22, Issue 2 , June 2022, Page 53-62
AbstractCryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ... Read More ...
Volume 22, Issue 2 , June 2022, Page 63-72
AbstractThis Face detection is considering one of the important topics for recognizing human, it is the first step before the face recognition process, it is considered one of the biggest challenges in the field of vision computer. In recent years Many algorithms for detection have appeared, which depend on ... Read More ...
Volume 22, Issue 2 , June 2022, Page 73-84
AbstractDue to sophisticated cyber-attacks, and to produce false alarms on suspicious or unusual behavior to monitor computer resources, Intrusion Detection Systems (IDSs) are required. Hence, Many Machine Learning (ML) and data mining techniques have been proposed to increase the effectiveness of IDSs, whereas ... Read More ...
Volume 22, Issue 2 , June 2022, Page 85-95
AbstractComputer worms execute damaging functions in the network systems, compromising system security. Although researchers use a variety of methods to detect worms and prevent their spread. Detecting worms remains a challenge for the following reasons: First, a huge volume of irrelevant data affects classification ... Read More ...
Volume 22, Issue 2 , June 2022, Page 96-108
AbstractRecently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ... Read More ...
Volume 22, Issue 2 , June 2022, Page 109-124
AbstractThe control technique for an exoskeleton system for lower limb rehabilitation is complicated, and numerous internal and external elements must be taken into account, in addition to the uncertainties in the system model. In this paper, through the analysis of the lower extremity exoskeleton is utilized ... Read More ...
Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm
Volume 22, Issue 2 , June 2022, Page 125-134
AbstractCrowd detection has various applications nowadays. However, detecting humans in crowded circumstances is difficult because the features of different objects conflict, making cross-state detection impossible. Detectors in the overlapping zone may therefore overreact. The proposal uses the YOLO v5 (You ... Read More ...
Volume 22, Issue 2 , June 2022, Page 135-145