Volume 7, Issue 3, Summer and Autumn 2010, Page 19-308

Computer Monitoring and Security System Using Bluetooth Technology

Mhmood Shuker Majeed; Abdul Sattar Muhammad Khidhir; Firas Abdul Rahman Yosif

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 19-32
DOI: 10.33899/csmj.2010.163906

The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. The application has been accomplished using wireless Bluetooth USB into the motion detector to demonstrate the establishment of connection and the changing of the motion detector settings. There will be a Graphic User Interface (GUI) implemented on the User Laptop and protocol written to let the user configure the motion detector sensitivity and range also monitoring using wireless surveillance camera.
The study also describes an investigation into implementation potential of remote access methods to laptop using PC Anywhere method. The implementation process consisting of application architecture design, system requirement, software design, hardware design and establish Bluetooth connection is described in detail. Experimental results show that the designed system is more reliable, flexible and easy to use.

Image Segmentation Based on New Modification on Normalized-Cut Algorithm

Khalil I. Alsaif

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 33-40
DOI: 10.33899/csmj.2010.163907

In this research, Normalized Cut algorithm was studied to segments any type of digital images which was widely used recently. In this paper wavelet transformation, and high-high frequency components which hold the edges of the image will be used to replace classical high frequency filters of  the old techniques achieved by the normalized cut algorithm ( which  used CANNY filter for edge detection).
          When the new modification of the  proposed algorithm applied on the different type of digital images (medical, aerial and natural images) after crossover the CANNY filter by the wavelet high-high coefficients, a very efficient segments were found much better than the segments got before, in addition to a deep information can be seen if the selected  segment is projected on the original image to be recognized.

Skin Classification Based on Co-occurance Matrix

khalil I. Alsaif; Shaimaa M. Mohi Al-Deen

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 41-50
DOI: 10.33899/csmj.2010.163908

In this paper an algorithm will be achieved to look for the properties of the skin for group then try to classify the skin of the group depending on the four properties (energy, contrast, correlation and homogeneity).
Studying the four above properties in details then gave whole view about their effect on skin feature extraction. The applied algorithm shows that the four above properties can be extracted as features for personal skin.
            The experimental results of the proposed algorithm shows that the energy gave high recognition properties comparing with the remaining properties.

Parallel Direct Search Methods

Bashir M. Khalaf; Mohammed W. Al-Neama

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 51-60
DOI: 10.33899/csmj.2010.163909

Mostly minimization or maximization of a function is very expensive. Since function evaluation of the objective function requires a considerable time. Hence, our objective in this work is the development of parallel algorithms for minimization of objective functions evaluation takes long computing time. The base of the developed parallel algorithms is the evaluation of the objective function at various points in same time (i.e. simultaneously).
We consider in this work the parallelization of the direct search methods, as these methods are non-sensitive for noise and globally convergent. We have developed two algorithms mainly they are dependent on the Hock & Jeff method in unconstrtrained optimization.
The developed parallel algorithm are suitable for running on MIMD machine which are consisting of several processors operating independently, each processor has it's own memory and communicating with each other through a suitable network.

Straight Lines Detection Based on GA with New Modification on Baron's Method

Fawziya Mahmood Ramo; Nidhal H. Al-Assady; Khalil I. Al-Saif

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 61-72
DOI: 10.33899/csmj.2010.163911

In view of development on feature extraction in digital image based on feature straight line, GA has been used in this paper after hybrid it with Baron's Method to detect straight line, some developments are performed on the Baron's Method and we called it Genetic Developed Baron's Method (GDBM). The proposed method has been applied in many of sample. The experiments show that the proposed hybrid method in this paper is achieves high performance and it produce 90% detection rate.

General Regression Neural Network Application for Dynamic Data Compression and Decompression

safwan hasoon; Susan Hassan Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 73-80
DOI: 10.33899/csmj.2010.163912

In the last decade have been witnessed a great development in artificial intelligence especially in neural network .This paper have been employed neural networks techniques for data compression and decompression.
 The application of General Regression Neural Network (GRNN) in data compression is very important of data transmission, because this technique offers less than memory storage and time for transferring of the data over computer networks or internet. Taking into consideration the data compression provides security of these data.
 The matlab version (R2009a ) is used for designing the propose system of neural network (GRNN) to dynamic data compression and decompression .

Arabic Word Recognition Using Wavelet Neural Network

Yousra F. Al-Irhaim; Enaam Ghanim Saeed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 81-90
DOI: 10.33899/csmj.2010.163913

In this paper, a system is presented for word recognition using  Arabic word signals. The aim of the paper is to improve the recognition rate by finding out good feature  parameters  based on discrete wavelet transform. We have used Daubechies  wavelet  for the experiment.  The back propagation neural network is used for classification. Test results showing the effectiveness of the proposed system are presented in this paper, A recognition accuracy of 77%.

An Investigation for Steganography using Different Color System

Amira B. Sallow; Zahraa M. Taha; Ahmed S. Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 91-108
DOI: 10.33899/csmj.2010.163915

Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In this paper, Least Significant Bit LSB-based Steganographic techniques is used to embed large of data in different color space models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by transforming the RGB value of the secret image pixels into three separate components into the pixels of the cover image.
            The measures (MSE, SNR, PSNR) were used to compare between the color space models, the comparisons proved that steganography with color systems (RGB and HIS) shown a best results.

Digital Information Hiding Techniques

Alyaa Moufaq Abdul Majeed Haleem; Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 109-120
DOI: 10.33899/csmj.2010.163916

Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where a host_signal is subject to distortions, for e.g., lossy_compression, and the degree to which the data must be immune to interception, modification, or removal by a third person.
Here, we explore two techniques (DC watermarking scheme and Time Domain watermarking technique) for addressing the data-hiding process and evaluate these techniques in light of the copyright protection application. The measures (SNR, PSNR, NRMSE) were used to improve the results. Besides that the Matlab were used as a programming language in this paper.

Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset

Najlaa Badie Aldabagh; Mafaz Muhsin Khalil

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 121-140
DOI: 10.33899/csmj.2010.163917

This paper compares between two models: Common Genetic algorithm and  the new Clonal selection theory in the field of Intrusion Detection. Genetic algorithms (GA) which is a model of genetic evolution, while Clonal selection theory (CST) is from models of the natural immune system NIS,  the two models are from two different fields of Artificial Intelligence AI but they have portion of shared operations and objectives. The comparison to be done by applying the two models on some records of Knowledge Discovery and Data mining tools which is known by the name KDD data sets (its records the data of the interring packets to the computer system from the internet), to produce population ( in case of GA) or antibodies (in case of CST) can recognize these abnormal records.         

Recognition of Eudiscoaster and Heliodiscoaster using SOM Neural Network

Raid R. AL-Nima

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 141-152
DOI: 10.33899/csmj.2010.163918

This research is aimed to design an Eudiscoaster and Heliodiscoaster recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the fossils picture for data acquisition. Second: applying neural networks techniques for recognition.
The image processing techniques display the steps for getting a very clear image necessary for extracting data from the acquisition of image type (.jpg). This picture contains the fossils. The picture should be enhanced to bring out the pattern. The enhanced picture is segmented into            144 parts, then an average for every part can easily be computed. These values will be used in the neural network for the recognition.
For neural network techniques, Self Organization Maps (SOM) neural network was used for clustering. The weights and output values will be stored to be used later in identification. The SOM network succeeded in identification and attained to (False Acceptance Rate = 15% - False Rejection Rate = 15%).

Two Approaches for Implementing & Improving Building Automation System (BAS)

Qutaiba I. Ali; Bashar Abdulazez; Nassr Meacer

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 153-168
DOI: 10.33899/csmj.2010.163919

Building Automation Systems (BAS) are used to both improve the indoor climate in buildings and to reduce the operational costs. In this paper, two approaches were used to implement a networked BAS. In the first one, Wireless Sensor Network (WSN) were used as the transporter of the measured samples which are forwarded to a central control room. We have deployed a medium scale WSN consists of 15 nodes and covers 12 rooms in an office building which is currently in-use. The second approach takes a new direction. In this method we suggest the use of an already installed network to carry measurement and control data of a centrally controlled air conditioning system. Our automation system will share the same network devices, transmission media and end points (i.e., PCs) with the traditional users of the network. We build our own programmable data acquisition card based on 8051 microcontroller, developing a LABVIEW based driver for this DAQ which forward the measured data to a LABVIEW based central control and monitoring PC.

Evaluating, and Scaling Web Programming Languages: A Comparison between PHP, JavaScript

Mahmood F. Abdullah

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 169-176
DOI: 10.33899/csmj.2010.163920

This work concerns with comparing web server resources. The most known web programming languages (PHP-JavaScript) were presented. An age calculator implemented as a web application. Many readings were taken as response time, CPU load and other readings are examined and compared. PHP was found to give best results in some cases and JavaScript is more suitable for other cases.

FPGA Based Speed Control of a Separately Excited DC Motor

Maan M. Shaker; Nasseer M. Basheer; Qusay H. Ali

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 177-186
DOI: 10.33899/csmj.2010.163921

An armature voltage control is used to control the supplied voltage of an armature of a 2 kW separately excited DC motor. A buck regulator is used to vary the supplied voltage of the motor. A pulse width modulation (PWM) generator is implemented to supply the signal to the gate of the switch of the buck regulator. A series or cascade compensator is placed to control the duty cycle of the (PWM) generator in the closed loop control system. Both cascade compensator and (PWM) generator are designed by adopting the very high speed integrated circuit hardware description language (VHDL) and the Xilinx Spartan-3E field programmable gate array (FPGA). The results obtained are in close resemblance with those got from a MATLAB model for the same system.

Digital Image Watermarking using Singular Value Decomposition

Sura Ramzi Sheriff

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 187-200
DOI: 10.33899/csmj.2010.163922

This paper  presents a digital image watermarking  that  applied theory of linear algebra called “Singular Value Decomposition (SVD)” to digital image watermarking .SVD watermarking scheme, which successfully embeds watermarks into images imperceptible way .SVD method can transform matrix A into product USV .
Watermarking, is the process of embedding data into a multimedia cover , and can be used primarily for copyright protection and other purposes.  Schemes that have recently been proposed modify the pixel values or Transform domain coefficients. The Singular Value Decomposition (SVD) is a practical numerical tool with applications in a number of signal processing fields including image compression. In an SVD-based watermarking scheme, the singular values of the cover image are modified to embed the watermark data. This method has been proposed an optimal SVD-based watermarking scheme that embeds the watermark in two steps. In the first step, the cover image is divided into smaller blocks and a piece of the watermark is embedded in each block. In the second step extracting the watermark  from the watermarked image.  
All tests and experiments are carried out using MATLAB as computing environment and programming language.

OLAP Techniques for Approximation and Mining Query Answering

Murtadaha M. Hamd; Waleed K. Hassan

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 201-212
DOI: 10.33899/csmj.2010.163923

Data warehouse (DW) systems have become a key component of the corporate information system architecture, in which they play a crucial role in building business decision support systems by collecting and consolidating data from a variety of internal and external sources. The content of a DW is analyzed by the On-Line Analytical Processing (OLAP) applications for the purpose of discovering trends, patterns of behavior, and anomalies as well as finding hidden dependencies between data . Through this research, theoretical concepts which are related with OLAP and Data Warehouse are studied in detail. In this work the SALES Data Warehouse  (SALESDW) , procedures are implemented and algorithms are developed like ODBC (Open DataBase Connectivity) for different sources, and Data cleansing to carry out the consistency of Data Warehouse (DW). The aim of the research are design a prototype of a SALES Data Warehouse (SALESDW) by adding and implementing the essential concepts , and implementing the OLAP techniques ( tools) on SALESDW.

The Use of Theory of Optimal Control on Mosul University Internet

Ahmed M. Al-Sabaawi; Muhammad A. Al-Kilani

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 19-30
DOI: 10.33899/csmj.2010.163924

The theory of optimal control is considered one of the modern and developed subjects, especially which can be represented in a dynamic setting. One of the modern applications of the optimal control theory is the field two-sided networks, as the model of optimal control was applied in this study and which was suggested by the scientists (Sun & TSE) in 2007 and has been applied as a case study on MosulUniversityinternetCenter.
The optimal upload and download quantities of the subscribers during one month , has been calculated through the application of  the optimal control model .

Using Index Light Points to Determine Object Dimensions in the Digital Images

Sundus Khaleel Ebraheem

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 31-46
DOI: 10.33899/csmj.2010.163925

Due to the huge development in the digital image processing scope and its wide used in many applications, and exist the needing in some applications such as engineering, military to find remotely the object dimensions and area and in the traffic field to find the height of trucks before the tunnels and intersections bridges and observation the traffic infringements that concerning the load part out of the vehicle body which may be more than the permissible limit.
Therefore, this paper suggest an approach to find the object dimensions by using digital images with an extension. The digital camera was modified by adding two lighting beams to apply point lights on the objet during image capturing. Then by using these two lighted points in the image the scale of the image was found which will be use to find object dimensions.
The proposed method applied by using many images with different objects. It was more efficient and accuracy 100% for determining dimensions of objects. It was applied by using Matlab R2010 ver. 7.0 language, laptop computer with 1.4GHz processor  IntelR CoreTM Solo CPU U3500 , screen resolution 1366*768.

Adoption of Neural Networks to Classified the Gender of the Speaker

Khalil I. Al-Saif; Mason Kh. Al-Nuaimi

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 47-56
DOI: 10.33899/csmj.2010.163926

In this research the neural network was adopted to classified the gender of the spoken, by creating the two dimension matrix from the parameters of the spoken speech signal which normal was snigle dimension array.
            The porpose algorithm in this research divided in two stage :-
            In the first stage the seven moment were calculated for a set of spoken signal of 50 persons , to be followed creating database depend on the seven moments .This database will be used to find the threshould value for both genders (male/female) which will be trained  by neural network to classify any  input tothe network.
In the second stage , speech  of any spoken will be selected and the same feature will be extracted , as in the first stage  , to be used as input to the neural network which was traind previously for gender recognition.
Back propagation neural network was achieved for recognition. The result of the applied algorithem on 10 spoken passed on 8 of them and 2 of them was failed .

Improvement of Color Correction for Digital Photographs

Manar Younis Kashmola; Zahraa Mazin Al Kattan

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 57-76
DOI: 10.33899/csmj.2010.163927

In other way misuse of correct illumination at the capture moment could affect the image landmarks ; regarding color brightness and the increasing “color cast “ which might cause the image to appear in an unacceptable Or unexpected manner. Thus; several algorithms have been developed to solve these problems and balancing image color and recover the real color of the landscape.
In this research an algorithm has been developed, depending on some statistics tools like (Mean, Variance and Equivalent Circle). Which leads to finding out the influential color in the image which leads to the alteration of the nature of its colors. It is called “color cast “. It could be classified into evident cast, predominant color, ambiguous cast or no cast. Then removing the cast distortion from the image and using error back propagation network for images classification into color cast carrier or uncarrier. This research has been applied on colored digital photos (BMP). More than (100) colored images were  also used containing all sorts of color cast that will be found out, classified and finally removed  from the image by using algorithm. The percentage of images which have no cast are (27%),The images have evident cast are (25%), where the images which have ambiguous cast are (16%),At the last ;the images which classified as predominant color are (12%),as well as there are (20%) of images classified as wrong .

Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts

Radwan Y. Al-Jawadi; Raid R. Al-Naima

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 77-90
DOI: 10.33899/csmj.2010.163928

This research aims in the first stage to built a cipher system using hybrid Genetic Algorithm with single layer Neural network to prevent any data attack during the transition process , where the ASCII of the letters are used as inputs to the network and the random numbers are used as outputs to the network , then the weights will be constructed after the network training .
In the second stage a decipher process is used to restore the ciphered data by using the inverse of the genetic neural network , where the inverse of weights is used as a key for the decryption process .
Stream cipher method is used to input the data in the network during the ciphering stage. This suggested technique attained 100% success.
All the ciphering and deciphering processes are built under MATLAB ver.(7) .

Proposed Method for Tracking Moon Phases using the Co-Occurrence Matrix

Abeer A. Thanoon

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 91-104
DOI: 10.33899/csmj.2010.163929

The study Proposes a method to detect the appearance of moon phase in a video serial (AVI) . The proposed algorithm  of photographic and videoing treatment presents a method to trace the appearance of moon phases through the analysis of image texture using Co-Occurrence matrix after reading the video file followed by the representation of texture features in the form of histogram followed by the segmentation of image depending on the values of histogram to obtain the detection of the target , i.e. , the moon in order to trace the appearance of moon phases within a video serial and then know the area of the lighted part of the moon surface via sun rays through which the geometric shape of the lighted area of the moon along the video serial can be estimated in each stage . then the moon phase may be expected as it is a ratio of the estimated area of the geometric shape in relation to the total area of the circular disc of the full moon . the purposed method can be applied whenever a video film of the moon is available.

Adopting the Principle of Closed Set to People Identification Based on Human Hand Geometry

Maha Abd Alrahman Al-Hasoo; Zeena N. Al-kateeb

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 105-120
DOI: 10.33899/csmj.2010.163930

We propose a Identification System Based on Human Hand Geometry Features, we extract 50 features to use it in recognition process. By constructing the principle of Close Set Identification System, the system database has been built using modified digital scanner. The system were tested on database contain 500 images referred to 50 persons, 10 images for each person.
The evaluation of the system performance was calculated by using three matching metrics that are Absolute Distance, Euclidean Distance, D1 Distance and get on the highest recognition rate using Absolute Distance more than 97%.
MATLAB 7.9.0(2009b) programming language has been used to execute the paper algorithms, because its facilities in processing digital images.

Remove Unimportant Features from True Colored Images Using the Segmentation Technique

Shahad A. Hasso

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 121-134
DOI: 10.33899/csmj.2010.163932

In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class maximum only. We find the true image as 24 bit and classify it to more than 50 classes. As we know k-means algorithm classify images to many independent classes or features and we could increase the class number therefore we could remove the classes or features that have minimum number of pixels which are considered unimportant features and reconstruct the images.
Correlation factor and Signal to Noise Ratio were used to measure the work and the results seems that by increasing the image resolution the effect of removing minimum features is decreased.
The CSharp (Visual Studio 2008) programming language was used to build the algorithms which are able to allocate huge matrices in high execution time.

Best Band Selection using Principle Component Analysis Algorithm from Remote Sensing Data

Maha A. Hasso; Mona J. Siddiq

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 135-144
DOI: 10.33899/csmj.2010.163933

The best band selection from remote sensing image plays an important roles in multispectral and hyperspectral remote sensing image processing due  to the intercorrelation that inherent in the multispectral images taken by remote sensing sensors.
In this paper we use principle component analysis  algorithm applied on remote sensing data and find covariance matrix for bands that should be processed then find eigen vector using Jacobi methods .The algorithm was  applied on multispectral images of Thematic Mapper sensor , it concluded that the six  band was  the best band , the value of it’s eigen value    was the biggest one  and the value of signal to noise ratio equals to 74.7217. This algorithm is constructed using  Visual C# 2008 that is characterized by efficient and high speed implementation.

Using Genetic Algorithm to Estimate (RNA) Estimator

Ban Ahmed Mitras; Farah Saad Nashat

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 145-160
DOI: 10.33899/csmj.2010.163934

In this paper the genetic algorithm has been used to estimate the parameter θ which exist in Boltzmann Distribution which controls the structure of the Ribo Nucleic Acid (RNA). Two algorithms have been suggested. The first found the value of the estimator which maximizes the likelihood function of Boltzmann Distribution. The second minimized the generation constraint of Boltzmann Distribution by using the genetic algorithm. Matlab (7.0) has been used in writing the programs of  algorithms and achieved the following results: The maximum value for the likelihood estimator for Boltzmann Distribution appear at the value -4.1614 where the value of θ is 0.1457, and the minimum value for the Constraint Generation for Boltzmann Distribution appear at the value 0.951039101*17  where the value of θ is -4.4066.

Genetic Pattern Recognition using Intelligent Techniques

Basil Younis Thanoon; Omar Saber Qasim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 161-172
DOI: 10.33899/csmj.2010.163935

In this research a light is shed on converting DNA series to amino acid being responsible for forming protein through intelligent techniques. Some comparisons have been made between particularly Artificial Neural Network, Fuzzy Logic and Genetic Algorithms for discovering the powerful and the week ones in particle way. The hybrid operation has been made between Artificial Neural Network and Fuzzy Logic t to get a hybrid technique in a new formula having robust results than the original ones.

Design and Implemented of an Algorithm for Covered Writing on a Video File (mov)

Raed R. A-Naima; Sarah B. Al-Naima

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 173-182
DOI: 10.33899/csmj.2010.163936

In this research, video file type (mov) is used to hide an English text. This method offered high accuracy and secure for data transitions. First, frames are extracted from video file. Then on algorithm has been designed and implemented to hide and extract the text message. Hiding process concerns with converting the text into corresponding codes, then store these codes inside the basic color panel of video file and exactly on the fourth order after floating point of every pixel. Extracting process concerns with inversing the whole process of hiding. Experimental results demonstrated success of  hiding process.
The designed algorithm has been implemented using Matlab (ver. 7) on P4 computer.

Chaotic Encryption Based on Biometric Key

Saja J. Mohammed; Melad jader saeed; Ielaf O. Abdul Majjed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 183-198
DOI: 10.33899/csmj.2010.163937

In this paper a new algorithm is suggested to encrypt data, as it was to benefit from human iris as one of Biometric properties in human body which distinguish the individual from the other to produce the encryption through extracting important features using Wavelet Transformation and then passing through a series of  operations moderation as the first phase, at the second phase a chaotic function properties is used by leading it in encryption operation as a basic factor.
Through the overlap between the results of above  phases a new encryption  algorithm is produced which show  strength, and could not discover the encryption key until  getting  the biometric property and  finding complete information about the chaotic used function  in addition to the working algorithm .

Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

Amera Istiqlal Badran; Abdulsattar M. Khidhir; laheeb Mohammed Ibrahim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 199-208
DOI: 10.33899/csmj.2010.163938

In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an input with the cover to Radial basis function Network to produce the weights.
Cover is delivered once to the recipient who can use it for unlimited number of messages. The weights are delivered to the recipient for each hidden message as a key. The recipient uses the cover with the weights to unhide the message. So that this method include two levels of security. The first one is hiding the message in the cover to produce stego-cover image. The second one is ciphering the embedded image using RBF Neural Network. This Network is considered as a target and the input to the Neural Network is the cover image. Then the weights, which represent the encrypted information are reconstructed. The recipient can use RBF Network to unhide the message by having the stego-cover image then the message.
Matlab R2008a was used in this paper.

Hiding Techniques using Mp3

Shyma Sh. Mohammed; Ahmed S. Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 209-226
DOI: 10.33899/csmj.2010.163939

In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the general public fall short when applied to audio files. Another factor that may be contributing to the increasing popularity is the widespread popularity of the MP3 file format and its ubiquitous presence on the Internet.
In this paper, an introductory look at steganography and the important methods for hiding data in audio is shown, as well as the strengths and weaknesses of each method. An overview about sound and their file formats especially MP3 file format and its attribute and features.
Here, some steganography techniques on sound (Low Bit Encoding, Phase Coding) has been used to apply them on MP3 file format which had been chosen as a cover for data transmission.

Denoise Digital Images Depending on Contourlet Transform

Khalil I. Al-Saif; Ahmed H. Saleh

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 227-242
DOI: 10.33899/csmj.2010.163940

In this paper a new, proposed way to denoise an image under the impact of different types of noise experienced by the image acquired during media, where the reliance on contourlet transform because of their ability to maintain the edges in the image(high-high frequency)in addition to its potential to capture information smooth contours, which is one of the most important information that must be maintained by the methods of restoration to get to an estimate of the original image.
Thus it was the use of an algorithm the threshold for the adoption of that every image inserted is denoise, the impact of noise which depending on the impulse response of contourlet transform, has been the adoption of digital images of different types, as an assessment of how much closer the image recovered to the original image through the use of some measurements including correlation coefficient as well as SNR , MSE and PSNR.
Results of applying the proposed algorithm on different type of images give a conclusion that adoption of contourlet transform, gives high stability  when image size is changed with noise acquires the image through the transformation  media.

Information Retrieval System for Digital Libraries Using Fuzzy Logic

Ghaydaa A.A. Al-Talib; Nawar Abdul Ghani

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 243-258
DOI: 10.33899/csmj.2010.163941

This research is one of the important steps towards processing the most significant challenge in digital libraries and web, which is computing document’s rank, its importance, and its relevance to the user information need. This is achieved through the utilization of fuzzy logic high potential capabilities in dealing with such sort of problems and providing notable flexibility for the user to get his favorite subjects.
The research is concerned with designing and implementing a proposed information retrieval system, called FIRS (Fuzzy Information Retrieval System). This system is developed to deal with huge database, which contains different text file types and sizes. This database is distributed over a collection of server computers, connected with the intranet network that is dedicated for this system.
The system has the ability for mining of data available in this database and retrieving the useful information that corresponds with the user need. This is accomplished through applying the proposed algorithms for indexing process, document’s rank computations, generating keywords process, and finally, displaying information retrieval results. The proposed system gives high quality results comparing with other information retrieving algorithms.

An Analytical Study of DNA Sequence

Basil Y. Thanoon; Fatima M Hasan

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 259-272
DOI: 10.33899/csmj.2010.163942

This paper contains a general introduction to Bioinformatics, theirs goals, objectives and their applied fields. Is then shed light on the real views of DNA of humans, some processors use mathematical and statistical analysis of the traditional purpose of these observations and to identify some features and characteristics. Graphical analysis of DNA is carried out in two and three dimensions. The inter-connectedness among the sites of DNA is also analyzed as well as a spectral analysis. The attempt is also made to identify the order of such observations. Through this analytical study it is shown that DNA has a complex structure with interdependent with each other for  long-term.

Building an Information Network System for Retirees in the Province Nineveh

Azza H. Zaki; Elham S. Mustafa

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 273-294
DOI: 10.33899/csmj.2010.163943

Information systems has become an important tool for improving the working efficiency of the organizations that have tended to design and build information systems for the purpose of control for the vast amount of information necessary.
This research aims to provide information for retirees in the province of Nineveh, and to identify the requirements of official circles of the information. This system requires the use of distributed databases and a set of central computers linked to a computer by a communications network and more information can be exchanged between network elements.

Building a Spatial Database by Developing a Work Environment to Accomplish the Automatic Transfer Process for Remote Sensing Data from Raster to Linear

Diaa Hazem Al-Berhawi

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 295-308
DOI: 10.33899/csmj.2010.163944

In this paper a develop an working environment for building spatial database by utilizing ArcView Geographic Information System software package and IDRISI software package for remotely sensed images processing is obtained. Through working environment remotely sensed images representation transformed from raster form to vector form. Programming environment of the ArcView and IDRISI software packages utilized to achieve spatial database building from remotely sensed images automatically. The results of the proposed working environment show efficiency in building spatial database in accurate and quick manner. Thus, these spatial database can be used in Geographic Information System applications.