Volume 7 Issue 3

Published: 2010-12-10

Contents


Research Paper
Computer Monitoring and Security System Using Bluetooth Technology

Mhmood Shuker Majeed, Abdul Sattar Muhammad Khidhir, Firas Abdul Rahman Yosif

The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. The application has been accomplished using wireless...

DOI: 10.33899/csmj.2010.163906

Pages: 19-32
The Use of Theory of Optimal Control on Mosul University Internet

Ahmed M. Al-Sabaawi, Muhammad A. Al-Kilani

The theory of optimal control is considered one of the modern and developed subjects, especially which can be represented in a dynamic setting. One of the modern applications of the optimal control...

DOI: 10.33899/csmj.2010.163924

Pages: 19-30
Using Index Light Points to Determine Object Dimensions in the Digital Images

Sundus Khaleel Ebraheem

Due to the huge development in the digital image processing scope and its wide used in many applications, and exist the needing in some applications such as engineering, military to find remotely...

DOI: 10.33899/csmj.2010.163925

Pages: 31-46
Image Segmentation Based on New Modification on Normalized-Cut Algorithm

Khalil I. Alsaif

In this research, Normalized Cut algorithm was studied to segments any type of digital images which was widely used recently. In this paper wavelet transformation, and high-high frequency...

DOI: 10.33899/csmj.2010.163907

Pages: 33-40
Skin Classification Based on Co-occurance Matrix

Khalil I. Alsaif, Shaimaa M. Mohi Al-Deen

In this paper an algorithm will be achieved to look for the properties of the skin for group then try to classify the skin of the group depending on the four properties (energy, contrast,...

DOI: 10.33899/csmj.2010.163908

Pages: 41-50
Adoption of Neural Networks to Classified the Gender of the Speaker

Khalil I. Al-Saif, Mason Kh. Al-Nuaimi

In this research the neural network was adopted to classified the gender of the spoken, by creating the two dimension matrix from the parameters of the spoken speech signal which normal was snigle...

DOI: 10.33899/csmj.2010.163926

Pages: 47-56
Parallel Direct Search Methods

Bashir M. Khalaf, Mohammed W. Al-Neama

Mostly minimization or maximization of a function is very expensive. Since function evaluation of the objective function requires a considerable time. Hence, our objective in this work is the...

DOI: 10.33899/csmj.2010.163909

Pages: 51-60
Improvement of Color Correction for Digital Photographs

Manar Younis Kashmola, Zahraa Mazin Al Kattan

In other way misuse of correct illumination at the capture moment could affect the image landmarks ; regarding color brightness and the increasing color cast which might cause the image to appear...

DOI: 10.33899/csmj.2010.163927

Pages: 57-76
Straight Lines Detection Based on GA with New Modification on Baron's Method

Fawziya Mahmood Ramo, Nidhal H. Al-Assady, Khalil I. Al-Saif

In view of development on feature extraction in digital image based on feature straight line, GA has been used in this paper after hybrid it with Baron's Method to detect straight line, some...

DOI: 10.33899/csmj.2010.163911

Pages: 61-72
General Regression Neural Network Application for Dynamic Data Compression and Decompression

safwan hasoon, Susan Hassan Mohammed

In the last decade have been witnessed a great development in artificial intelligence especially in neural network .This paper have been employed neural networks techniques for data compression and...

DOI: 10.33899/csmj.2010.163912

Pages: 73-80
Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts

Radwan Y. Al-Jawadi, Raid R. Al-Naima

This research aims in the first stage to built a cipher system using hybrid Genetic Algorithm with single layer Neural network to prevent any data attack during the transition process , where the...

DOI: 10.33899/csmj.2010.163928

Pages: 77-90
Arabic Word Recognition Using Wavelet Neural Network

Enaam Ghanim Saeed, Yousra F. Al-Irhaim

In this paper, a system is presented for word recognition using Arabic word signals. The aim of the paper is to improve the recognition rate by finding out good feature parameters based on discrete...

DOI: 10.33899/csmj.2010.163913

Pages: 81-90
An Investigation for Steganography using Different Color System

Ahmed S. Nori, Amira B. Sallow, Zahraa M. Taha

Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In...

DOI: 10.33899/csmj.2010.163915

Pages: 91-108
Proposed Method for Tracking Moon Phases using the Co-Occurrence Matrix

Abeer A. Thanoon

The study Proposes a method to detect the appearance of moon phase in a video serial (AVI) . The proposed algorithm of photographic and videoing treatment presents a method to trace the appearance...

DOI: 10.33899/csmj.2010.163929

Pages: 91-104
Adopting the Principle of Closed Set to People Identification Based on Human Hand Geometry

Maha Abd Alrahman Al-Hasoo, Zeena N. Al-kateeb

We propose a Identification System Based on Human Hand Geometry Features, we extract 50 features to use it in recognition process. By constructing the principle of Close Set Identification System,...

DOI: 10.33899/csmj.2010.163930

Pages: 105-120
Digital Information Hiding Techniques

Alyaa Moufaq Abdul Majeed Haleem, Nadia M. Mohammed

Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the...

DOI: 10.33899/csmj.2010.163916

Pages: 109-120
Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset

Najlaa Badie Aldabagh, Mafaz Muhsin Khalil

This paper compares between two models: Common Genetic algorithm and the new Clonal selection theory in the field of Intrusion Detection. Genetic algorithms (GA) which is a model of genetic...

DOI: 10.33899/csmj.2010.163917

Pages: 121-140
Remove Unimportant Features from True Colored Images Using the Segmentation Technique

Shahad A. Hasso

In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class...

DOI: 10.33899/csmj.2010.163932

Pages: 121-134
Best Band Selection using Principle Component Analysis Algorithm from Remote Sensing Data

Maha A. Hasso, Mona J. Siddiq

The best band selection from remote sensing image plays an important roles in multispectral and hyperspectral remote sensing image processing due to the intercorrelation that inherent in the...

DOI: 10.33899/csmj.2010.163933

Pages: 135-144
Recognition of Eudiscoaster and Heliodiscoaster using SOM Neural Network

Raid R. AL-Nima

This research is aimed to design an Eudiscoaster and Heliodiscoaster recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the fossils...

DOI: 10.33899/csmj.2010.163918

Pages: 141-152
Using Genetic Algorithm to Estimate (RNA) Estimator

Ban Ahmed Mitras, Farah Saad Nashat

In this paper the genetic algorithm has been used to estimate the parameter which exist in Boltzmann Distribution which controls the structure of the Ribo Nucleic Acid (RNA). Two algorithms have...

DOI: 10.33899/csmj.2010.163934

Pages: 145-160
Two Approaches for Implementing & Improving Building Automation System (BAS)

Qutaiba I. Ali, Bashar Abdulazez, Nassr Meacer

Building Automation Systems (BAS) are used to both improve the indoor climate in buildings and to reduce the operational costs. In this paper, two approaches were used to implement a networked BAS....

DOI: 10.33899/csmj.2010.163919

Pages: 153-168
Genetic Pattern Recognition using Intelligent Techniques

Omar Saber Qasim, Basil Younis Thanoon

In this research a light is shed on converting DNA series to amino acid being responsible for forming protein through intelligent techniques. Some comparisons have been made between particularly...

DOI: 10.33899/csmj.2010.163935

Pages: 161-172
Evaluating, and Scaling Web Programming Languages: A Comparison between PHP, JavaScript

Mahmood F. Abdullah

This work concerns with comparing web server resources. The most known web programming languages (PHP-JavaScript) were presented. An age calculator implemented as a web application. Many readings...

DOI: 10.33899/csmj.2010.163920

Pages: 169-176
Design and Implemented of an Algorithm for Covered Writing on a Video File (mov)

Raed R. A-Naima, Sarah B. Al-Naima

In this research, video file type (mov) is used to hide an English text. This method offered high accuracy and secure for data transitions. First, frames are extracted from video file. Then on...

DOI: 10.33899/csmj.2010.163936

Pages: 173-182
FPGA Based Speed Control of a Separately Excited DC Motor

Maan M. Shaker, Nasseer M. Basheer, Qusay H. Ali

An armature voltage control is used to control the supplied voltage of an armature of a 2 kW separately excited DC motor. A buck regulator is used to vary the supplied voltage of the motor. A pulse...

DOI: 10.33899/csmj.2010.163921

Pages: 177-186
Chaotic Encryption Based on Biometric Key

Melad jader saeed, Saja J. Mohammed, Ielaf O. Abdul Majjed

In this paper a new algorithm is suggested to encrypt data, as it was to benefit from human iris as one of Biometric properties in human body which distinguish the individual from the other to...

DOI: 10.33899/csmj.2010.163937

Pages: 183-198
Digital Image Watermarking using Singular Value Decomposition

Sura Ramzi Sheriff

This paper presents a digital image watermarking that applied theory of linear algebra called Singular Value Decomposition (SVD) to digital image watermarking .SVD watermarking scheme, which...

DOI: 10.33899/csmj.2010.163922

Pages: 187-200
Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

Amera Istiqlal Badran, Abdulsattar M. Khidhir, laheeb Mohammed Ibrahim

In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an input with the cover to Radial basis...

DOI: 10.33899/csmj.2010.163938

Pages: 199-208
OLAP Techniques for Approximation and Mining Query Answering

Murtadaha M. Hamd, Waleed K. Hassan

Data warehouse (DW) systems have become a key component of the corporate information system architecture, in which they play a crucial role in building business decision support systems by...

DOI: 10.33899/csmj.2010.163923

Pages: 201-212
Hiding Techniques using Mp3

Ahmed S. Nori, Shyma Sh. Mohammed

In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the...

DOI: 10.33899/csmj.2010.163939

Pages: 209-226
Denoise Digital Images Depending on Contourlet Transform

Khalil I. Al-Saif, Ahmed H. Saleh

In this paper a new, proposed way to denoise an image under the impact of different types of noise experienced by the image acquired during media, where the reliance on contourlet transform because...

DOI: 10.33899/csmj.2010.163940

Pages: 227-242
Information Retrieval System for Digital Libraries Using Fuzzy Logic

Ghayda A.A. Al-Talib, Nawar Abdul Ghani

This research is one of the important steps towards processing the most significant challenge in digital libraries and web, which is computing documents rank, its importance, and its relevance to...

DOI: 10.33899/csmj.2010.163941

Pages: 243-258
An Analytical Study of DNA Sequence

Basil Y. Thanoon, Fatima M Hasan

This paper contains a general introduction to Bioinformatics, theirs goals, objectives and their applied fields. Is then shed light on the real views of DNA of humans, some processors use...

DOI: 10.33899/csmj.2010.163942

Pages: 259-272
Building an Information Network System for Retirees in the Province Nineveh

Azza H. Zaki, Elham S. Mustafa

Information systems has become an important tool for improving the working efficiency of the organizations that have tended to design and build information systems for the purpose of control for...

DOI: 10.33899/csmj.2010.163943

Pages: 273-294
Building a Spatial Database by Developing a Work Environment to Accomplish the Automatic Transfer Process for Remote Sensing Data from Raster to Linear

Diaa Hazem Al-Berhawi

In this paper a develop an working environment for building spatial database by utilizing ArcView Geographic Information System software package and IDRISI software package for remotely sensed...

DOI: 10.33899/csmj.2010.163944

Pages: 295-308