Volume 10 Issue 1

Published: 2013-03-05

Contents


Research Paper
Digital Image Watermarking Scheme Using Discrete Wavelet Transform Domain, Quantization, and Genetic Algorithm

Nasseer Basheer, Shaymaa S Abdulsalam

Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. Watermarking is identified as a major means to achieve copyright...

DOI: 10.33899/csmj.2013.163421

Pages: 13-27
Authentication of Deoxyribo Nucleic Acid (DNA)

Naglaa Badi Ibrahim, Yassin Hikmat Ismail

random and have the ability to store a large amount of information. DNA sent either in natural form in the test tube (after being processed) or in digital form (a series of nitrogenous bases), in...

DOI: 10.33899/csmj.2013.163438

Pages: 17-23
Distributed Databases: ERP System as a Case Study Model in the Factory of Fabric and Weave in Mosul

Akram Ahmed Al-Tawil, Bilal Tawfiq Younis

The Research aim to implementation Distributed Database approach through ERP system that new application for information Technology Owing to the Scarcity of the Arabic studies tackling ERP System...

DOI: 10.33899/csmj.2013.163439

Pages: 25-46
Parallel Programming for Solving Linear BVP’s by Linear Superposition using CS_Tools

Bashir Khalaf, Firas Saeed

The objective of this paper is to speed the solution of linear Boundary Value Problem (LPVPs) by parallel Programming by using cs_tools where the solution methods is the linear superposition...

DOI: 10.33899/csmj.2013.163422

Pages: 29-42
Use of General Regression Artificial Neural Network to Identify the Natural Growth of Head Circumference of the Baby

Susan H. Mohammed, Aesha S. Shaheen, Amera I. Melhum

Recently, many cases of deformities and health problems that affect the newborn were recorded, because of the known pollutants and radiation. One of these problems is the growth of the child, both...

DOI: 10.33899/csmj.2013.163423

Pages: 43-52
Building a System to People Identification Based on Human Hand Geometry

Maha Abd Alrahman Al-Hasoo, Zeena N. Al-kateeb

This paper present a new practical authentication system which is depend on one of the biometrics features Hand Geometry features. the proposed system Captures human hand image to extract 50...

DOI: 10.33899/csmj.2013.163440

Pages: 47-60
Three Proposed Hybrid Genetic Algorithms

Nada F. Hassan, Ban A. Mitras

Genetic Algorithm has been hybridized with classical optimization methods. Hybridization has been done in three approaches, by using conjugate gradient algorithm for Fletcher and Reeves, second by...

DOI: 10.33899/csmj.2013.163424

Pages: 53-64
An Algorithm for Smoker Detection

Hiba Adreese Youni, Saleem Omar, Mafaz Abd Alwahhab, Enas Mqdad

In this research an algorithm was suggested for studying speech signal properties for both smokers and non smokers then verificate that the person smoker or not based on his speech signal. A data...

DOI: 10.33899/csmj.2013.163441

Pages: 61-74
The Discrimination of Red Blood Cells Infected by Hereditary Hemolytic Anemia

Ghayda A.A. Al-Talib, Hesham H. Mohameed

This paper presents a medical application based on digital image processing and Artificial Neural Network (ANN), which can recognize three types of Hereditary Hemolytic Anemia (HHA) that affect the...

DOI: 10.33899/csmj.2013.163425

Pages: 65-78
Encrypted and Hiding Information in Digital Images using Wavelet Transformation and LSB Technology

Ahmed Hamed Saleh Al-Badrani

Hiding information is an effective solution for the protection of copyright and confidentiality to allow a person to send the data in the middle of the cover image to a person without knowing any...

DOI: 10.33899/csmj.2013.163442

Pages: 75-84
Botne and Botnet Detection Survey

Manar Y. Ahmad, Maisireem A. Kamal

Among the various forms of malware, Botnets are emerging as the most serious threat, Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and...

DOI: 10.33899/csmj.2013.163426

Pages: 79-89
Building a Multi-Period Probability Dynamic Inventory Model with Application

Ahmed Mahmoodi Al-Sebaw, Noor Abdul Aziz Hussein

In this paper addresses the multi-period single-item inventory problem with stochastic demands. In which the demand in each period is known but it varies from time to time for N replenishment...

DOI: 10.33899/csmj.2013.163443

Pages: 85-101
Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data

Alaa Jumaa, Sufyan T. F. Al-Janabi, Nazar A. Ali

Data mining is the process of extracting hidden patterns from data. One of the most important activities in data mining is the association rule mining and the new head for data mining research area...

DOI: 10.33899/csmj.2013.163427

Pages: 91-105
Reconcile an Appropriate Model for the Occurrence of Periods of Infection with Hepatitis C in the Province of Nineveh - A comparative Study with the Geometric Process Model -

Muthanna Subhi Sulaiman, Shaimaa Waleed Mahmood

In this study we are build a model for the intervals of occurrence of viral hepatitis type C in Nineveh province by using of time-series analysis, and compared with the Geometric process model, and...

DOI: 10.33899/csmj.2013.163444

Pages: 103-112
Hybrid System for Speech Coding Based on Contourlet Transformation

Khalil I. Alsaif, Hadia S. Albadrani

The main objective of speech coding is to allow the transmission of speech over digital channel of the highest speech quality and least possible bit rate, beside the security purpose. In this...

DOI: 10.33899/csmj.2013.163428

Pages: 107-117
Identification of Some Variables Affecting the Granting of The Fundamentals of Computer and Internet Certificate (IC3)

Marwan A. Dabdoub, Ahmed M. Esmaeel

To identify certain variable that influence the result Internet and Computing Core Certification examination (IC3) which is conducted in the ComputerCenter and Internet at the University of Mosul....

DOI: 10.33899/csmj.2019.163445

Pages: 113-125
Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices

Omar A. Ibrahim, Omar A. AL-Saffar

Mobile technology is rapidly developed, this developing leads the production of the multimedia smartphone that supports wireless LAN (WLAN) that are widely deployed because of its ease of use,...

DOI: 10.33899/csmj.2013.163429

Pages: 119-126
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System

Najla B. Ibraheem, Muna M. T. Jawhar, Hana M. Osman

Security has become an important issue for networks. Intrusion detection technology is an effective approach in dealing with the problems of network security. In this paper, we present an intrusion...

DOI: 10.33899/csmj.2013.163430

Pages: 127-135
Adoption of the Co-Occurrence Matrix and Artificial Neural Networks in Fingerprint Recognition

Maysoon Khidr Al-Nuaimi

This paper presents a new method for fingerprint recognition depending on various sizes of fingerprint images. The proposed algorithm applied on more than 30 fingerprint samples, the results was...

DOI: 10.33899/csmj.2013.163446

Pages: 127-136
Using Kernel Estimator and K-Mean Clustering Approach to Hand Gesture Recognition

Ban A. Mitras, AAlA Mahmood Mohammed

In this paper we used non parametric density estimator (Kernel Estimator) to estimate probability density function for Image data of Hand Gesture and warping Hand Gesture and we see the curve for...

DOI: 10.33899/csmj.2013.163447

Pages: 137-145
Existing Object Oriented Design Metrics a Study and Comparison

Laheeb M. Al-Zobaidy, Khalil A. Ibrahim

Software Quality still a vague and multifaceted concept, which means different things to different people, metrics for object oriented design focuses on measurements that are applied to the class...

DOI: 10.33899/csmj.2013.163431

Pages: 137-147
The Use of the Artificial Immune Network Algorithm AIN in Distinguishing English Character Pattern

Maha Abd Alellah Mohammad

The focus of the present research is on the issue of patterns compatibility regarding an English letter through the use of a probable research Algorithm called the Artificial Immune Network (AIN(....

DOI: 10.33899/csmj.2013.163448

Pages: 147-156
Design and Implementation of OLAP System for Distributed Data Warehouse

Murtadha M. Hamad, Abdullah F. Mahdi

Data warehousing and on-line analytical processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. A distributed OLAP system is...

DOI: 10.33899/csmj.2013.163432

Pages: 149-155
Using Artificial Intelligence Techniques For Intrusion Detection System

Manar Y. Ahmed, Bayda I. Khaleel

Along with the development and growth of the internet network, and the rapid expansion of World Wide Web and local network systems have changed the computing world in the last decade. Nowadays, as...

DOI: 10.33899/csmj.2013.163433

Pages: 157-175
Modeling and Analyzing Virtual Links Links Between the Sites of the Centers of the University of Mosul

Basil Younis Al-Khayat, Talal Fadel Hussein

This paper deals with PageRanks which are used in the analysis of web links. It displays an introduction for the concept PageRanks and also some basic theoretical aspects related to it. It...

DOI: 10.33899/csmj.2013.163449

Pages: 157-167
Use the Genetic Algorithm to Encode and Hide Gray Image Data

Raya Jassim Essa, Reham Jassim Essa, Inam Muhammad Sulaiman

With the development of means of communication, computer science and information exchange via electronic information networks an urgent need emerged to find ways to save exchanged information....

DOI: 10.33899/csmj.2013.163450

Pages: 169-182
State of Art: Semantic Web

Najla B. Ibraheem, Ban Sh. Mustafa

Semantic Web is an extension to the current web. It will convert the way we use World Wide Web (WWW) by giving the machine the capability to process and infer data in web. It starts as a vision and...

DOI: 10.33899/csmj.2013.163434

Pages: 177-186
An Analytical Mathematical Study of Artificial Neural Network Algorithms in the Suitability of a Model for Medical Diagnosis

Omar Saber Qasim, Israa Rustum Mohammed

In this research discuss the concept of appropriate form, by examining mathematical behavior for three models represent neural networks are (GRNN, BPNN, PNN), were applied two types of medical data...

DOI: 10.33899/csmj.2013.163451

Pages: 183-194
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems

Dhuha Basheer Abdullah, Amira B. Sallow

In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the...

DOI: 10.33899/csmj.2013.163435

Pages: 187-193
Cuneiform Symbols Recognition Based on K-Means and Neural Network

Naktal M. Edan

Cuneiform is the ancient writing systemin the world. But, there is no clear interest recognition cuneiform symbol, despite its importance. This research interested in building an algorithm for...

DOI: 10.33899/csmj.2013.163436

Pages: 195-202
Improved LSB Method using Standard Deviation Scale

Nadia M. Mohammed, Riyam J. Essa, Amina M. Najim

The concealment of the most important means used by the security institutions with critical communications in all countries of the world, they provided the technology of high security, especially...

DOI: 10.33899/csmj.2013.163452

Pages: 195-208
Using Random Scrambling in Multi Media Encoding

Ghada Mohammad Tahir Qasim

The research deals with implementation of a new algorithm to encrypt multimedia files this method called random scrambling, to increase the security of the transmitted files, a secret key is used...

DOI: 10.33899/csmj.2013.163453

Pages: 209-225
Development of Traditional Algorithm Used in Denoising to Enhance Contrast of the Color Images

Hanan Ali, Esraa Abd Al-Majed, Asmaa Nadhim, Rahma Saleem

With the evolution of life and complexity there is a need to use the images in many scientific fields weather forecast, medical, engineering, and the fact that these images are a lot of distortion...

DOI: 10.33899/csmj.2013.163454

Pages: 227-238
GLM for Image Steganography Technique

Ahmed S. Nori, Noor N. Ahmed, Thana Gh. Ahmed

An improvement to a Steganography method for hiding data using Gray Level Images is proposed in this paper. The method is an improvement over earlier method named Least Significant Bit (LSB). This...

DOI: 10.33899/csmj.2013.163455

Pages: 239-249
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data

Naglaa Badi Ibrahim, Hana Muhammad Usman

The increasing of security attacks and unauthorized intrusion have made network security one of the main subjects that should be considered in present data communication environment. Intrusion...

DOI: 10.33899/csmj.2013.163456

Pages: 251-261
Hide Compressed Texts in an Audio File

Shahad Abdel-Rahman Hasso

Steganography art is a technique of hiding data within data, as hiding text message within an image or an audio file or a video file, it is a new method used as a substitute for the known...

DOI: 10.33899/csmj.2013.163457

Pages: 263-274
Use the Frequency Domain to Hide in Some Audio Files

Zahraa Tarik, Farah T. Mohammd, Ikhlass Thanoon, Azhar Rafie

In this work, anew hiding algorithm is proposed that depends on using two deferent domain (spatial and frequency) to achieve and provide security and protection for transformed data, which is...

DOI: 10.33899/csmj.2013.163458

Pages: 275-284
Suggested Method for Audio File Steganography

Saja J. Mohammed, Faris E. Mohammed

The world is tend now a lot of development in communication field specially in internet , therefore it is very important to find security methods for files that is send from one place to another....

DOI: 10.33899/csmj.2013.163459

Pages: 285-295
Direct Transmission of Products Designs in Distributed Manufacturing

Ammar Thaher Yaseen

Information and Communication Technique show an efficient technical capabilities for management and controlling the distributed operations among various factories. For this, the industrial...

DOI: 10.33899/csmj.2013.163460

Pages: 297-307
Electronic Forecasting of Women's Jumping Events using Neural Networks

Fares Ghanem Ahmed, Aida Younis Muhammad, Hala Nafi Fathi

The aim of this research is to use neural network in future forecasting field to show the of jumping competitions in international Olympics for (2016-2024). Expert system named (AAA) is designed by...

DOI: 10.33899/csmj.2013.163461

Pages: 309-321
Representation of the Wavelet Transform 2D using A 5/3 Filter on the Field Programmable Gate Array

Maha Hasso, Sahla Abdul Ali

Recently the Wavelet Transform has gained a lot of popularity in the field of signal and image processing, this is due to its capability of providing both time and frequency information...

DOI: 10.33899/csmj.2013.163462

Pages: 323-331
Dimensionality Reduction using Hybrid Algorithms and Their Application to Remote Sensing Data

Maha Abdul Rahman Hasso, Mona Jaafar Siddiq

In this work, A proposed Algorithm has been constructed for the selecting the best band and lessening high dimension of remote sensing data depending on multi algorithms, each on carried out and...

DOI: 10.33899/csmj.2013.163463

Pages: 333-349
Estimate Programmatic Effort using the Traditional COCOMO Model and Neural Networks

Jamal Salah Al-Din Sayed Majeed, Isra Zuhair Majeed Qabaa

Estimation models in software engineering are used to predict some important and future features for software project such as effort estimation for developing software projects. Failures of...

DOI: 10.33899/csmj.2013.163464

Pages: 351-364
Building a Software System Using a Spiral Model to Evaluate the Overall Risk of Projects Using Fuzzy Number Theory

Jamal Salah Al-Din Sayed Majeed, Ro’a Amer Hussain

This research aims presented a practical application for the process of assessing the overall risk of the projects following the risk management in software engineering steps, the life cycle is the...

DOI: 10.33899/csmj.2013.163465

Pages: 365-384
Suggest a Reverse Engineering Tool to Analyze the Software Source Code Written in Java

Alaa Yassin Taqah, Tawfiq Miqdad Tawfiq

Reverse engineering has presented solution to a major problem in the development and maintenance of the legacy software which is the process of understanding these software types, It is a difficult...

DOI: 10.33899/csmj.2013.163466

Pages: 385-407
Building a Search Engine for the Personal Computer and the Local Network

Fares Adel Dawood, Khaled Hussein, Mohamed Majed

Computer users need to advanced methods for accessing stored information with at high speed and accurate information retrieval of from among the millions of files stored on a personal computer when...

DOI: 10.33899/csmj.2013.163467

Pages: 409-420
Design a Tool for Generating Test Cases using Swarm Intelligence

Shahbaa I. Khaleel, Ashraf Abdulmunim Al Thanoon

In this research, the tools and techniques of artificial intelligence were studied and employed in software engineering. And that was conducted through using the Particle Swarm Optimization PSO and...

DOI: 10.33899/csmj.2013.163468

Pages: 421-444