Volume 23 (2023)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Color Visual Cryptography Based on Three Dimensional Chaotic Map

Shaymaa Ammar Fadhil; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, Page 1-12


  Cryptographic approaches based on chaos theory provide a several new and promising avenues for developing safe picture encryption solutions. This paper aims to complicate the process of decrypting images by adding encryption with keys, this was achieved by applying the principle of the 3D-chaotic system ...  Read More ...

PAPR Reduction for Different O-OFDM in VLC Using -Law Companding and Convolutional Encoder

Samir M. Hameed; Sinan M. Abdulsatar; Atheer Alaa Sabri

Volume 22, Issue 2 , June 2022, Page 13-26


  Researchers have extensively utilized optical orthogonal frequency division multiplexing (O-OFDM) in visible light communication (VLC) to achieve high data rate transmission for free spectrum bandwidth. The peak-to-average power ratio (PAPR) is the critical challenge for VLC systems-based O-OFDM that ...  Read More ...

Convolutional Recurrent Neural Networks for Text Lecture Summarization

Muna Ghazi; Matheel Abdulmunim

Volume 22, Issue 2 , June 2022, Page 27-39


  Text summarization can be utilized for variety type of purposes; one of them for summary lecture file. A long document expended long time and large capacity. Since it may contain duplicated information, more over, irrelevant details that take long period to access relevant information. Summarization ...  Read More ...

Unknown Input Observer-Based Decentralized PID- BFO Algorithm for Interconnected Systems Against Fault Actuator

Noor Safaa; Montadher sami shaker

Volume 22, Issue 2 , June 2022, Page 40-52


  This article presents a decentralized controller/observer for nonlinear large- scale interconnected systems with actuator fault. The proposal integrates a robust proportional-integral-derivative (PID) controller with the unknown input observer (UIO) to achieve closed-loop robustness against the interactions ...  Read More ...

A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak)

Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi

Volume 22, Issue 2 , June 2022, Page 53-62


  Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ...  Read More ...

Comparative of Viola-Jones and YOLO v3 for Face Detection in Real time

Tameem Obaida; Nidaa Flaih Hassan; Abeer Salim Jamil

Volume 22, Issue 2 , June 2022, Page 63-72


  This Face detection is considering one of the important topics for recognizing human, it is the first step before the face recognition process, it is considered one of the biggest challenges in the field of vision computer. In recent years Many algorithms for detection have appeared, which depend on ...  Read More ...

Proposed Hybrid Ensemble Learning Algorithms for an Efficient Intrusion Detection System

doaa nteesha mhawi; Soukaena H. hashem

Volume 22, Issue 2 , June 2022, Page 73-84


  Due to sophisticated cyber-attacks, and to produce false alarms on suspicious or unusual behavior to monitor computer resources, Intrusion Detection Systems (IDSs) are required. Hence, Many Machine Learning (ML) and data mining techniques have been proposed to increase the effectiveness of IDSs, whereas ...  Read More ...

Intrusion Detection System Based on Ada boosting and Bagging Algorithm

Ali khalid Hilool; Soukaena H. hashem; Shatha H. Jafer

Volume 22, Issue 2 , June 2022, Page 85-95


  Computer worms execute damaging functions in the network systems, compromising system security. Although researchers use a variety of methods to detect worms and prevent their spread. Detecting worms remains a challenge for the following reasons: First, a huge volume of irrelevant data affects classification ...  Read More ...

Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Sameeh Abdulghafour Jassim; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, Page 96-108


  Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...  Read More ...

Optimal Linear Quadratic Control for Knee-Ankle Orthosis System

Fatimah I. Hussein; Safanah Raafat

Volume 22, Issue 2 , June 2022, Page 109-124


  The control technique for an exoskeleton system for lower limb rehabilitation is complicated, and numerous internal and external elements must be taken into account, in addition to the uncertainties in the system model. In this paper, through the analysis of the lower extremity exoskeleton is utilized ...  Read More ...

Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm

Mohammed Abduljabbar Ali; Abir Jaafar Hussain; Ahmed T. Sadiq

Volume 22, Issue 2 , June 2022, Page 125-134


  Crowd detection has various applications nowadays. However, detecting humans in crowded circumstances is difficult because the features of different objects conflict, making cross-state detection impossible. Detectors in the overlapping zone may therefore overreact. The proposal uses the YOLO v5 (You ...  Read More ...

Survey: Recent Techniques of Image Fragile Watermarking

hala khalid Hussien; Ra'ad A. Muhajjar; Bashar saadoon mahdi

Volume 22, Issue 2 , June 2022, Page 135-145


  Ease of access to digital images and the many images editing programs available, like photoshop. All this makes the Issue of protecting images against modification becomes essential. Some images contain crucial information that can risk a patient's life, such as medical images and e- government images ...  Read More ...