مجلد 13 عدد 2 (2019)
Articles
Abstract: Surveillance camera systems have been widely used in homes, businesses and other places of work. These systems with its all capabilities and features provide protection to people who uses them. In this work, a home security alarm system was designed and implemented based on the Microsoft Kinect sensor. The introduced system can detect intrusion and respond to it in real-time. If the intrusion is detected, the system sends SMS as a notification to the authorized user. Moreover, as soon as the intrusion is detected, pictures will be taken using the RGB camera of the Kinect. These pictures will be sent to the authorized user via email, and saved on the local drive. Simultaneously, the proposed system emits a loud sound to frighten away intruders. The proposed system could be used in homes, offices, warehouses, banks, hospitals, etc..
Abstract: Nowadays, robotics technology has become very popular in all fields of human life. Many robots have been already used in different applications such as indoor service, military undertaking, entertainment, healthcare service, etc. On the other hand, controlling robot remotely plays an important role in many areas when people cannot reach easily. Therefore, the aim of this work is to allow users to perform remote control experiments on a mobile robot through Bluetooth, Internet and SMS. The commands could be entered manually, using voice command, or using QR code. To limit the cost of the proposed system, the inexpensive (compared to more professional robot platforms) LEGO Mindstorm robot is used.
Abstract: Data transmission, security and authenticity, nowadays is considered the major source of problems. To face these problems a suitable solution have to be forwarded . Steganography is forwarded one of the solutions as a technique among many. This paper includes proposal for using a new technique called (Quick Respond Codes) QR Codes . QR Codes technique is mainly used to convert and store messages since it has higher and large storage capacity, in addition to that we used, in this paper , the STR (Short Tandem Repeats) DNA sequence. STR DNA is very important because each person has its own DNA which means that security and authentication ) reliable ( are very high. The proposed method is to convert the hidden data (STR DNA sequence) to QR code that mean the security is at maximum. Then, by using the MD5 (Message Digest 5) Algorithm, the result data is converted to QR code and the data within the data areas are stored in an unusually large format to make retrieval difficult. Finally, STR DNA sequences were applied in different lengths and converted to QR code. By this method , the QR code is applied in different applications and it was very fast (3-4 second). To apply this technique and to reduce the cost, we use a webcam to get back the private (confidential) data from the QR code. The data were retrieved completely without any error because QR code is reliable and authentic. From the above result we suggest to use QR Code for indentification of the of the individual (ID).
Abstract: Nowadays, data from different real-time data streams are coming in. The classical relational database systems cannot manage such big data. Big data should be managed in a way that keeps the semantic relations between different concepts. Ontology is a powerful tool that comes from the concept of the semantic web, can formulate data schema as semantically connected objects. Ontology can be shared and reused across different domains and sites. In this paper, an ontology that captures the main concepts and their relationships in Mosul university is proposed. The main steps for OMU (ontology for Mosul University) development are showen using protégé ontology editor. Also, several queries are implemented to show how we can use inference engine to infer new and implicit knowledge from ontologies. visualization tools are used to visualize OMU ontology.
Abstract: In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System with six cross-product nonlinearities terms, 2017], this system has three critical points employs ten terms include six quadratic cross-product nonlinearity terms, We notice that when we apply any linear control method that relies on a single unit control added to the system, the system behavior in this case cannot control it, so we applied enhancing linear feedback control at origin and we noticed that a necessary condition for suppression is getting positive feedback coefficient. Theoretical analysis and numerical simulation check the validity of the results obtained.
Abstract: Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterpart, Steganalysis, which aims to suspect and analyze the transmitted media to decide wither it contain an embedded data or not which we present in a blind Steganalysis way. One-Class Classification (OCC) machine learning algorithms aim to build classification models depending on positive class only when the negative class is not available or poorly sampled. Here in this paper we depend on a one-class support vector machines (OCSVM) which has been trained on only one class of images that is clean images class, so that the trained classifier can classify new reviews to their correct class i.e. clean or stego. Training an OCC turned to be hard work and required long execution time since classifier parameters tuning, data separation and model evaluation needed to be done manually in a brute force way. A powerful programming language (Python) with the powerful machine learning library (Scikit-Learn) gave a promising classification results in deciding whether an input image is clean or stego image.
Abstract: Feature selection is one of the most important issues in improving the data classification process. It greatly influences the accuracy of the classification. There are many evolutionary algorithms used for this purpose, such as the Particle Swarm Optimization (PSO) in discrete space through the Binary PSO concept. The BPSO optimization algorithm derives its mechanism from the default PSO algorithm but in discrete space. In this research, a hybrid approach was proposed between the BPSO algorithm and Mutual Information (MI) to obtain subsets of features through two basic phases: the first is to use the BPSO algorithm to determine the features affecting the data classification process by relying on an objective function. In the second phase, the MI method is used to reduce the number of features identified by the BPSO method. The results of the proposed algorithm have demonstrated efficiency and effectiveness by obtaining higher classification accuracy and using fewer features than default methods.
Abstract: An ideal K of a ring R is called right (left) generalized pure (GP -ideal) if for every a ∈ K, there exists m ∈ Z+, and b ∈ K such that am = am b ( am = b am) . A ring R is called MLGP-ring if every right maximal ideal is left GP-ideal. In this paper have been studied some new properties of MLGP-rings and the relation between this rings and strongly π-regular rings some of the main result of the present work are as follows: 1- Let R be a local ,MLGP and SXM ring. Then: (a) J (R) = 0. (b) If R is NJ-ring. Then r(am) is a direct sum and for all ∈ R, m ∈ Z+. 2- Let R be a local, SXM and NJ-ring . Then R is strongly π-regular if and only if R i LGP.