Articles

Applying the Method of Enhancing Feedback Control On a 4D Hyperchaotic System
Mahasin Younis (Author)
June 2019 ,Pages 13-21

Abstract: In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System with six cross-product nonlinearities terms, 2017], this system has three critical points employs ten terms include six quadratic cross-product nonlinearity terms,  We notice that when we apply any linear control method that relies on a single  unit control added to the system, the system behavior in this case cannot control it, so we applied enhancing linear feedback control at origin and we noticed that a necessary condition for suppression is getting positive feedback coefficient. Theoretical analysis and numerical simulation check the validity of the results obtained.  

  PDF
New Parameter of CG-Method for Unconstrained Optimization
Hamsa Chilmeran, Satia Al-Taie, Enaam Saeed (Author)
June 2019 ,Pages 22-31

Abstract: In this paper, we derived a new parameter by equating the modified QN direction which is suggested by [7] and the standard CG method which satisfied the sufficient descent condition and the global convergence under some assumptions. The numerical experiment of the new algorithm perform better than  previous standard  algorithm depending on the number of calling the function (NOF) and number of iterations (NOI).  

  PDF
Proposed Algorithm For Using GLCM Properties To Distinguishing Geometric Shapes
Kifaa Thanoon (Author)
June 2019 ,Pages 32-47

Abstract: In this research, an algorithm was used to look at the characteristics of a set of images for geometric shapes and then to classify them into totals based on four characteristics obtained from the co-occurrence matrix (energy, contrast, correlation and homogeneity). Studying the above four characteristics in detail and then presenting a complete presentation on the extent of their effect on the distinctive characteristics of the geometrical shapes. The adopted algorithm shows that the above four qualities can be new features of geometric shapes in digital images. The results of the practical application of the proposed algorithm show that the three features of homogeneity, energy, and contrast give a topical distinction to the shape, but the correlation property is weak in the distinction of shape. The algorithm was programmed using MATLAB R2010a for Windows 7 operating system on the computer that has the following specifications: (Processor Intel (R) Core (TM) i5, CPU 640 M & 2.53 GHZ, RAM 6GB).  

  PDF
Image Enhancement Techniques for Images at Blur Motion and Different Noises
Sahlah Ali (Author)
June 2019 ,Pages 48-60

Abstract: Image restoration is an art to improve image quality by disposing of reducing the amount of noise and blurring present in the image. So it is one of the research titles of interest to the researchers. The images get degraded due to environmental conditions and atmospheric difference, it is therefore important to retrieve original images using different algorithms of image processing. There are widespread applications to restore images in our world today. In this research we present a new proposed method to manipulate image using median filter and has also applied inverse filter to image restoration, then combining the proposed method with inverse filter. The proposed method has been evaluated and compared with inverse Filter and with the merger by using different performance with parameters to verify efficiency and performances of these methods. The experimental results on the test image will explain the capabilities of the proposed method to restored image, were the value of the image quality and PSNR (peak Signal to Noise ratio) is better compared with inverse filter, where values of PSNR for Lena Image is 70.3536 and for Girl Image is 71.5410 when using the proposed method of median filter, while values of PSNR when using inverse filter are 62.3225 and 62.6008 respectively when speckle noise.  

  PDF
17 New Existences linear [n,3,d]19 Codes by Geometric Structure Method in PG(2,19)
Nada Kasm Yahya, Mustafa Salim (Author)
June 2019 ,Pages 61-86

Abstract: The purpose of this paper is to prove the existence of 17 new linear [337,3,318]19, [289,3,271]19, [266,3,249]19, [246,3,230]19, [219,3,204]19, [206,3,192]19, [181,3,168]19, [157,3,145]19, [141,3,130]19, [120,3,110]19, [112,3,103]19, [82,3,74]19, [72,3,65]19, [54,3,48]19, [37,3,32]19, [26,3,22]19, [13,3,10]19 codes by geometric structure method in PG(2,19) .  

  PDF
A Robust Spectral Three-Term Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems
Abbas Al-Bayati, Sabreen Abbas (Author)
June 2019 ,Pages 87-104

Abstract: In this paper, we investigated a new improved Conjugate  Gradient (CG) algorithm of a Three-Term type (TTCG) based on Dai and Liao procedure to improve the CG algorithm  of (Hamoda, Rivaie, and Mamat / HRM). The new CG-algorithm satisfies both the conjugacy condition and the sufficient descent condition. The step-size of this TTCG-algorithm would be computed by accelerating the Wolfe-Powell line search technique. The proposed new TTCG algorithms have demonstrated their global affinity in certain specific circumstances given in this paper.  

  PDF
Detection and Classification of Emotional State Based on Speech Signal
Hiba Younis, Mrewan Mustafa, Rahma Raad (Author)
June 2019 ,Pages 13-27

Abstract: In this research, an algorithm was proposed to automatically classify the mood of the speaker by referring to his speech. Three moods were adopted in this study, namely joy, sadness and anger in order to distinguish between them.  The principle of the algorithm work includes the initial treatment of the signal of by removing the silence and then cut the signal to a number of sections length of each 512 sample, and then treatment by window (Hamming window) followed by the process of extracting the characteristics such as energy, the basic frequency, resonance frequencies of each section and for all speech signals that Were recorded, which included 30 signals of persons between 15 and 25 years of age in order to prepare the database for the three moods and to draw the characteristic curves and  for each mood. The selection of signals was done from training and testing set for detectingthe mood of these signals by performing the previous steps and then comparing the resulting curve with the previous curves using the correlation coefficient and the Euclidean distance. The algorithm gave good results when these characteristics were adopted in the classification process and by about 75%.  

  PDF
A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata
Ansam Abdulmajeed, Fatima Abdullatif, Wafaa Mustafa (Author)
June 2019 ,Pages 28-36

Abstract: The present research was aimed to design and implement an algorithm that combines cryptography and steganography to achieve a higher level of security. The algorithm hid encrypted text into color images in a scattered manner based on randomly generated numbers. The rules of cellular automata were used to encrypt the secret text and generate random numbers. Each character of a secret text was treated as a cellular automaton and the rule 153 was used to encrypt it with the help of a secret key. The encrypted text was hide in the red plane of the cove image after generating random numbers by applying rules 30, 60, 90 as a hybrid cellular automata using the same secret key as an initial seed. The results were tested on a number of images that shown that the algorithm hide the secret text in the images without distorting it clearly, the algorithm also retrieved the entire secret text without any loss. It was concluded that the use of hybrid cellular automata is better in generating random numbers than using uniform cellular automata.  It was also concluded that applying the retrieval algorithm with any minor changes in the value of the secret key affects the output of the decryption and the output of random number generation and causes a significant difference in the retrieved text.  

  PDF
Hybrid Method between the Discrete Wavelets Translate Technique and the Chaos System Based by the Least Significant Bit Algorithm to Encrypt and Hide a Digital Video File
Hasan Ahmed (Author)
June 2019 ,Pages 37-52

Abstract: The use of computers today is the most important and widespread means of storing, retrieving and circulating information through local and international networks and smart phones. Thus it is possible to intercept information through different networks or access to computers, whether independent or connected with the network for the purpose of viewing its contents or stealing information or to tamper with, and in this light must ensure the protection, reliability and credibility of information and preservation of the emergence of various means of protection such as the use of encryption and techniques of hiding or coverage of information. This research is based on a hybrid method between the Discrete Wavelets Translate technique (DWT) and the Chaos system based on the Least Significant Bit algorithm (LSB) to encrypt and hide a digital video file within another digital video that represents the cover by inserting the digital video file and segmenting it into a set of frames and then analyze each frame to its colors (red, green and blue) and then study the color values ​​of each frame and the process of encryption based on the equation of the logistics function (chaotic functions), and the application of the Discrete Wavelets Translate technique on the color slides of the cover frame. The hiding process is done using the Least Significant Bit algorithm based on the logistic function by calculating the series of random locations of cover area. The results showed that the hybridization of the Discrete Wavelets Translate technique and the chaos system based on the Least Significant Bit algorithm was an effective method for encrypting and hiding digital video files. After applying the work algorithms to a set of samples, the results showed consistency and compatibility in the encrypting and hiding process with the samples that was dealt with.  

  PDF
Income Tax for Employees using Visual Basic and Access Database
Ruba Ibrahim, Mohamed Mohamed, Nashwan Ramadan (Author)
June 2019 ,Pages 53-67

Abstract: In previous years, database applications were built in the form of a file system, but many disadvantages were found after that, such as: data replication , inconsistency while storing, difficulty in accessing data and need to write a new program to execute each new task in addition to isolating the data within multiple file formats ..... etc. All the above problems were solved by using database systems. This paper is an applied to demonstrate the effective role of the tax information system to establish and operate knowledge database as a knowledge management requirement by:  the conceptualization of the income tax, knowledge management system and the development of the retirement information system. In this paper, the ACCESS database was created and linked with the Visual Basic language to calculate income tax of the employees. Where the information of employee is entered (such as the employee's name, number and social status as well as the nominal salary). The system has saved and modified information of employees , printing a report on one employee or more, as well as knowing the amount of tax that got from employees .  

  PDF
Use the Brute_Force Pattern Matching Algorithm for Misuse Intrusion Detection System
Haleema Sulaiman (Author)
June 2019 ,Pages 68-85

Abstract: Security issues, like network intrusion and viruses, have been increased widely with the growth of computer applications and networks. Therefore, it becomes necessary to develop methods to protect information from malicious attacks within the different environments. One of these methods is to use intrusion detection system for the detection of different interventions. The research was presented a way to detect misuse intrusion (Misuse Detection System), as was performed classification of events, which will be either the events of Normal Events or Intrusion Events. This classification process has been based on one of the String Pattern matching Algorithms, which is Brute_Force algorithm. Brute_Force algorithm   is used after making a comparison between this algorithm and another two algorithm (Knuth – Morris – Pratt String Matching and Boyer-Moore Algorithm). Data processed in the work is taken from the KDD list. The written version of this data, which will be similar to the data format in the comma separated values files (CSV), This data has been converted to tables and then a comparison between these tables is made for the purpose of categorizing events based on the algorithm mentioned above. Java language has been used in this work as one of the most powerful programming languages, has been the adoption of Eclipse environment to write Java classes used in the work.  

  PDF