Volume 6 Issue 1

Published: 2009-01-02

Contents


Research Paper
Personal Identification with Iris Patterns

Mazin R. Khalil, Mahmood S. Majeed, Raid R. Omar

This research is aimed to design an iris recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the picture of an eye for data acquisition....

DOI: 10.33899/csmj.2009.163762

Pages: 13-26
Face Recognition and Determination in Color Images

Manar Younis Kashmola, Najim Abdallah Altahhan

The aim of this study is face detection in colored images (single or multiple faces) where an algorithm based on skin color information, in addition to face features like eyes and mouth, are used....

DOI: 10.33899/csmj.2009.163782

Pages: 13-29
Design of a Hybrid Intelligent System for Transitional Bladder Cell Carcinoma Diagnosis

Nada N. Saleem, Khalid N. Saleem

Transitional Bladder cell carcinoma is one of the most common cancers of the urinary tract, accounting for approximately 90% of Bladder cancers. In this research a new computer-based system "Design...

DOI: 10.33899/csmj.2009.163763

Pages: 27-40
Segmentation of Brain Tumor Images Using Genetic Algorithms

Dhuha Basheer Abdullah, Mohameed Nathem, Manar Y. Kashmola

In this research, the brain images resulting from computerized tomography (CT) have been used in order to determine the tumor area in the brain. the steps started by preprocessing operation to the...

DOI: 10.33899/csmj.2009.163783

Pages: 31-45
Simulation of Real Time 2D DWT Structure

Mohanad L. Ahmad

This research contains an introduction to the first works in this field, and describes the Discrete Wavelet Transform DWT which is the only kind that can be implemented in the digital computer. The...

DOI: 10.33899/csmj.2009.163764

Pages: 41-48
Use Artificial Neural Network Neococcontron in Distinguishing Handwritten Arabic Numerals

Laheeb Mohammad Ibrahim, Hanan H. Ali

Artificial Neural Networks have wide applications now a day, Among these are in the field of pattern recognition and image processing. This is due to the fact that it has a good performance and...

DOI: 10.33899/csmj.2009.163784

Pages: 47-59
Design and Analysis of a Sound Generator for wave file format via Parallel Printer Port

Dhuha Basheer Abdullah

Ports in computers are used mainly for two reasons : Device control & communication. Parallel ports are mainly meant for connecting the printer to the PC. The purpose of this paper is to design...

DOI: 10.33899/csmj.2009.163765

Pages: 49-61
Detect Flame Fire Using Fractal Geometry in Color Digital Images

Laheeb Mohammad Ibrahim, Khalil I. Alsaif, Hasan M. Alnima

Pattern recognition, which takes features extraction as a basis for decision making, is considered as of the cutting-edge technologies. It is used in various useful applications such as tracking...

DOI: 10.33899/csmj.2009.163785

Pages: 61-78
Controlled Gene-Accumulation Programming

Najla Akram Al-Saati, Nidhal Al-Assady

A full description of a new novel method proposed for Automatic Programming is brought forward in this work. Controlled Gene-Accumulation programming is a method that is purely inspired by concepts...

DOI: 10.33899/csmj.2009.163766

Pages: 63-79
A Comparative Study between Traditional Learning and Virtual Learning (Design a Virtual Learning System)

Maisireem A. Al-Sayeg

Virtual learning is an essential source of growth in scientific in recent years by standing in the basis of many of the virtual learning programs. In this research virtual learning program has been...

DOI: 10.33899/csmj.2009.163786

Pages: 79-89
Improving Gene Expression Programming Method

Najla Akram Al-Saati, Nidhal Al-Assady

In this work the algorithm of Gene Expression Programming (GEP) is investigated thoroughly and the major deficiencies are pointed out. Multiple suggestions for enhancements are introduced in this...

DOI: 10.33899/csmj.2009.163767

Pages: 81-95
Using Hebbian Network for Cipher

Amera Istiqlal Badran, Nidal Hussein Al-Asadi

This research contains two parts, in the first part, a ciphering system is built using the classical Hebbian network to protect data against many expected threats during the transfer of the data....

DOI: 10.33899/csmj.2009.163787

Pages: 91-101
Fingerprint Image Pre- Post Processing Methods for Minutiae Extraction

Fayadh. M. Abed, Adnan Maroof

A set of reliable techniques is presented in this paper. These techniques include enhancement and minutiae extraction that involve the clarity of the ridge and valley structures of the input...

DOI: 10.33899/csmj.2009.163768

Pages: 97-110
Pulmonary Tuberculosis Diagnosis Using Artificial Neural Networks

Karam Hatim Thanoon, Mohammed Abd-alraheem Hamdi

This research can detecting the Tuberculosis by using the artificial neural networks, the idea of this research is to design a system that receive the information of patient and give these...

DOI: 10.33899/csmj.2009.163788

Pages: 103-114
Home Automation Management with WLAN (802.11g) and RF Remote Control

Mahmood S. Majeed, Abdulsattar M. Khidhir, Firas A. Yosif

The home automation becomes important, because it gives the user the comfort and ease for using the home devices. The implementation and design of wireless home automation control use two methods,...

DOI: 10.33899/csmj.2009.163770

Pages: 111-124
Hiding in Text using Information Integrity Service

Dujan B. Taha, Ahmed S. Nori, Yaseen H. Ismaiel

Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information....

DOI: 10.33899/csmj.2009.163789

Pages: 115-122
Using the Petri Network to Organize Resource Sharing between Two Processors

Firas Mohammad Al-Abadi

With the development of information technology and the use of its applications as an essential aspect in almost all patterns of life especially in fields of analysis and real time systems, a...

DOI: 10.33899/csmj.2009.163790

Pages: 123-133
Geometric Analysis of Images for 3D Models Reconstruction

Rou’a H. Ali, Abdulsatter M. Khidhir, Mayyada Gh. Hammoshi

Determining three-dimensional (x, y, z) to a point exists in the form of three-dimensional images of two-dimensional method is complex and requires high precision to derive the equations that were...

DOI: 10.33899/csmj.2009.163771

Pages: 125-132
Counter Mode Development for Block Cipher Operations

Ali M. Sagheer

There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertextusually of 64 bits but sometimes longer. Stream...

DOI: 10.33899/csmj.2009.163772

Pages: 133-144
Finding the Amount of the Occupation of a Specific Datum in a ‎Database File

Rayan Yousif Alkhayat

This research includes constructing a software system to find the amount of a specific datum occupation in a database file using fractal dimension , Box Counting method was used to calculate the...

DOI: 10.33899/csmj.2009.163791

Pages: 135-147
Design and Implementation of Computer Network-Based Robotic System Using HTML Language and CGi Scripts

Maan M. Shaker, Mahmood Sh. Majeed, Mahmood F. Abdullah

A design and implementation of computer network-based robotic system using HTML language and CGI (Common Gateway Interface) scripts is carried out. The network of the implemented system may be...

DOI: 10.33899/csmj.2009.163773

Pages: 145-152
Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network

Mohammed Zaki Hasan

Wireless internet access based on Wireless Local Area Network (WLAN), such as a wireless-Fidelity (Wi-Fi), or Bluetooth networks will become popular with the next few years. New services will be...

DOI: 10.33899/csmj.2009.163774

Pages: 153-160
Building Simple Protection for Wireless-Fidelity Network

Manar Y. Ahmed, Mohammed Z. Hasan

This paper describes some of the attacker utilize to disrupt wireless networks through MAC address, and then perform the simple protection through Traffic Protocol Authentication Module (TPAM)....

DOI: 10.33899/csmj.2009.163775

Pages: 161-168
Arabic Character Recognition Using Fractal Dimension

Khalil I. Alsaif, Karam Hatim Thanoon

In this work the concepts of the pattern recognition was used to recognize printed Arabic characters, and the Fractal geometric dimension method was used. The input for the system is image, with...

DOI: 10.33899/csmj.2009.163776

Pages: 169-178
Principle Component Selection for Face Recognition Using Neural Network

Ibrahim A. Saleh

Face Recognition is an emerging field of research with many challenges such as large set of images,. Artificial Neural Network approach is one of the simplest and most efficient method to overcome...

DOI: 10.33899/csmj.2009.163777

Pages: 179-191
Design and Implementation of Router Remote Control System Supporting Static Route Summarization

Ali H. Ali

In order to improve and upgrade the performance of devices used in data communications, such devices are particularly Routers, which are used to link computer networks among themselves, and for...

DOI: 10.33899/csmj.2009.163778

Pages: 193-208
Authenticated and Secure End-To-End Communication Channel Using SMS Messages

Abdullah A. Abdullah

One of the key issues of modern cryptography is the problem of establishing a secure end-to-end communication over an insecure communication channel. Short Message Service (SMS) is a hugely popular...

DOI: 10.33899/csmj.2009.163779

Pages: 209-222
Protection Against Internal Intruding using Host Identifier Authentication

Basil Y. Alkhayaat, Abdulsattar M. khidhir, Omar A. Ibraheem

Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most effective one is the network firewall....

DOI: 10.33899/csmj.2009.163780

Pages: 223-236
Design and Implementation of Stream Cipher Using Neural Network

Siddeq Y. Ameen, Mazin Z. Othman, safwan hasoon, Moyed Abud Al-Razaq

The centaral problem in stream cipher cryptograph is the the difficulty to generate a long unpredicatable sequence of binary signals from short and random key. Unpredicatable sequence are desirable...

DOI: 10.33899/csmj.2009.163781

Pages: 237-249