Volume 7 Issue 3
Published: 2010-12-10
Contents
Research Paper
Computer Monitoring and Security System Using Bluetooth Technology
Mhmood Shuker Majeed, Abdul Sattar Muhammad Khidhir, Firas Abdul Rahman Yosif
The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. The application has been accomplished using wireless...
DOI: 10.33899/csmj.2010.163906
The Use of Theory of Optimal Control on Mosul University Internet
Ahmed M. Al-Sabaawi, Muhammad A. Al-Kilani
The theory of optimal control is considered one of the modern and developed subjects, especially which can be represented in a dynamic setting. One of the modern applications of the optimal control...
DOI: 10.33899/csmj.2010.163924
Using Index Light Points to Determine Object Dimensions in the Digital Images
Sundus Khaleel Ebraheem
Due to the huge development in the digital image processing scope and its wide used in many applications, and exist the needing in some applications such as engineering, military to find remotely...
DOI: 10.33899/csmj.2010.163925
Image Segmentation Based on New Modification on Normalized-Cut Algorithm
Khalil I. Alsaif
In this research, Normalized Cut algorithm was studied to segments any type of digital images which was widely used recently. In this paper wavelet transformation, and high-high frequency...
DOI: 10.33899/csmj.2010.163907
Skin Classification Based on Co-occurance Matrix
Khalil I. Alsaif, Shaimaa M. Mohi Al-Deen
In this paper an algorithm will be achieved to look for the properties of the skin for group then try to classify the skin of the group depending on the four properties (energy, contrast,...
DOI: 10.33899/csmj.2010.163908
Adoption of Neural Networks to Classified the Gender of the Speaker
Khalil I. Al-Saif, Mason Kh. Al-Nuaimi
In this research the neural network was adopted to classified the gender of the spoken, by creating the two dimension matrix from the parameters of the spoken speech signal which normal was snigle...
DOI: 10.33899/csmj.2010.163926
Parallel Direct Search Methods
Bashir M. Khalaf, Mohammed W. Al-Neama
Mostly minimization or maximization of a function is very expensive. Since function evaluation of the objective function requires a considerable time. Hence, our objective in this work is the...
DOI: 10.33899/csmj.2010.163909
Improvement of Color Correction for Digital Photographs
Manar Younis Kashmola, Zahraa Mazin Al Kattan
In other way misuse of correct illumination at the capture moment could affect the image landmarks ; regarding color brightness and the increasing color cast which might cause the image to appear...
DOI: 10.33899/csmj.2010.163927
Straight Lines Detection Based on GA with New Modification on Baron's Method
Fawziya Mahmood Ramo, Nidhal H. Al-Assady, Khalil I. Al-Saif
In view of development on feature extraction in digital image based on feature straight line, GA has been used in this paper after hybrid it with Baron's Method to detect straight line, some...
DOI: 10.33899/csmj.2010.163911
General Regression Neural Network Application for Dynamic Data Compression and Decompression
safwan hasoon, Susan Hassan Mohammed
In the last decade have been witnessed a great development in artificial intelligence especially in neural network .This paper have been employed neural networks techniques for data compression and...
DOI: 10.33899/csmj.2010.163912
Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts
Radwan Y. Al-Jawadi, Raid R. Al-Naima
This research aims in the first stage to built a cipher system using hybrid Genetic Algorithm with single layer Neural network to prevent any data attack during the transition process , where the...
DOI: 10.33899/csmj.2010.163928
Arabic Word Recognition Using Wavelet Neural Network
Enaam Ghanim Saeed, Yousra F. Al-Irhaim
In this paper, a system is presented for word recognition using Arabic word signals. The aim of the paper is to improve the recognition rate by finding out good feature parameters based on discrete...
DOI: 10.33899/csmj.2010.163913
An Investigation for Steganography using Different Color System
Ahmed S. Nori, Amira B. Sallow, Zahraa M. Taha
Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In...
DOI: 10.33899/csmj.2010.163915
Proposed Method for Tracking Moon Phases using the Co-Occurrence Matrix
Abeer A. Thanoon
The study Proposes a method to detect the appearance of moon phase in a video serial (AVI) . The proposed algorithm of photographic and videoing treatment presents a method to trace the appearance...
DOI: 10.33899/csmj.2010.163929
Adopting the Principle of Closed Set to People Identification Based on Human Hand Geometry
Maha Abd Alrahman Al-Hasoo, Zeena N. Al-kateeb
We propose a Identification System Based on Human Hand Geometry Features, we extract 50 features to use it in recognition process. By constructing the principle of Close Set Identification System,...
DOI: 10.33899/csmj.2010.163930
Digital Information Hiding Techniques
Alyaa Moufaq Abdul Majeed Haleem, Nadia M. Mohammed
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the...
DOI: 10.33899/csmj.2010.163916
Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset
Najlaa Badie Aldabagh, Mafaz Muhsin Khalil
This paper compares between two models: Common Genetic algorithm and the new Clonal selection theory in the field of Intrusion Detection. Genetic algorithms (GA) which is a model of genetic...
DOI: 10.33899/csmj.2010.163917
Remove Unimportant Features from True Colored Images Using the Segmentation Technique
Shahad A. Hasso
In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class...
DOI: 10.33899/csmj.2010.163932
Best Band Selection using Principle Component Analysis Algorithm from Remote Sensing Data
Maha A. Hasso, Mona J. Siddiq
The best band selection from remote sensing image plays an important roles in multispectral and hyperspectral remote sensing image processing due to the intercorrelation that inherent in the...
DOI: 10.33899/csmj.2010.163933
Recognition of Eudiscoaster and Heliodiscoaster using SOM Neural Network
Raid R. AL-Nima
This research is aimed to design an Eudiscoaster and Heliodiscoaster recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the fossils...
DOI: 10.33899/csmj.2010.163918
Using Genetic Algorithm to Estimate (RNA) Estimator
Ban Ahmed Mitras, Farah Saad Nashat
In this paper the genetic algorithm has been used to estimate the parameter which exist in Boltzmann Distribution which controls the structure of the Ribo Nucleic Acid (RNA). Two algorithms have...
DOI: 10.33899/csmj.2010.163934
Two Approaches for Implementing & Improving Building Automation System (BAS)
Qutaiba I. Ali, Bashar Abdulazez, Nassr Meacer
Building Automation Systems (BAS) are used to both improve the indoor climate in buildings and to reduce the operational costs. In this paper, two approaches were used to implement a networked BAS....
DOI: 10.33899/csmj.2010.163919
Genetic Pattern Recognition using Intelligent Techniques
Omar Saber Qasim, Basil Younis Thanoon
In this research a light is shed on converting DNA series to amino acid being responsible for forming protein through intelligent techniques. Some comparisons have been made between particularly...
DOI: 10.33899/csmj.2010.163935
Evaluating, and Scaling Web Programming Languages: A Comparison between PHP, JavaScript
Mahmood F. Abdullah
This work concerns with comparing web server resources. The most known web programming languages (PHP-JavaScript) were presented. An age calculator implemented as a web application. Many readings...
DOI: 10.33899/csmj.2010.163920
Design and Implemented of an Algorithm for Covered Writing on a Video File (mov)
Raed R. A-Naima, Sarah B. Al-Naima
In this research, video file type (mov) is used to hide an English text. This method offered high accuracy and secure for data transitions. First, frames are extracted from video file. Then on...
DOI: 10.33899/csmj.2010.163936
FPGA Based Speed Control of a Separately Excited DC Motor
Maan M. Shaker, Nasseer M. Basheer, Qusay H. Ali
An armature voltage control is used to control the supplied voltage of an armature of a 2 kW separately excited DC motor. A buck regulator is used to vary the supplied voltage of the motor. A pulse...
DOI: 10.33899/csmj.2010.163921
Chaotic Encryption Based on Biometric Key
Melad jader saeed, Saja J. Mohammed, Ielaf O. Abdul Majjed
In this paper a new algorithm is suggested to encrypt data, as it was to benefit from human iris as one of Biometric properties in human body which distinguish the individual from the other to...
DOI: 10.33899/csmj.2010.163937
Digital Image Watermarking using Singular Value Decomposition
Sura Ramzi Sheriff
This paper presents a digital image watermarking that applied theory of linear algebra called Singular Value Decomposition (SVD) to digital image watermarking .SVD watermarking scheme, which...
DOI: 10.33899/csmj.2010.163922
Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network
Amera Istiqlal Badran, Abdulsattar M. Khidhir, laheeb Mohammed Ibrahim
In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an input with the cover to Radial basis...
DOI: 10.33899/csmj.2010.163938
OLAP Techniques for Approximation and Mining Query Answering
Murtadaha M. Hamd, Waleed K. Hassan
Data warehouse (DW) systems have become a key component of the corporate information system architecture, in which they play a crucial role in building business decision support systems by...
DOI: 10.33899/csmj.2010.163923
Hiding Techniques using Mp3
Ahmed S. Nori, Shyma Sh. Mohammed
In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the...
DOI: 10.33899/csmj.2010.163939
Denoise Digital Images Depending on Contourlet Transform
Khalil I. Al-Saif, Ahmed H. Saleh
In this paper a new, proposed way to denoise an image under the impact of different types of noise experienced by the image acquired during media, where the reliance on contourlet transform because...
DOI: 10.33899/csmj.2010.163940
Information Retrieval System for Digital Libraries Using Fuzzy Logic
Ghayda A.A. Al-Talib, Nawar Abdul Ghani
This research is one of the important steps towards processing the most significant challenge in digital libraries and web, which is computing documents rank, its importance, and its relevance to...
DOI: 10.33899/csmj.2010.163941
An Analytical Study of DNA Sequence
Basil Y. Thanoon, Fatima M Hasan
This paper contains a general introduction to Bioinformatics, theirs goals, objectives and their applied fields. Is then shed light on the real views of DNA of humans, some processors use...
DOI: 10.33899/csmj.2010.163942
Building an Information Network System for Retirees in the Province Nineveh
Azza H. Zaki, Elham S. Mustafa
Information systems has become an important tool for improving the working efficiency of the organizations that have tended to design and build information systems for the purpose of control for...
DOI: 10.33899/csmj.2010.163943
Building a Spatial Database by Developing a Work Environment to Accomplish the Automatic Transfer Process for Remote Sensing Data from Raster to Linear
Diaa Hazem Al-Berhawi
In this paper a develop an working environment for building spatial database by utilizing ArcView Geographic Information System software package and IDRISI software package for remotely sensed...
DOI: 10.33899/csmj.2010.163944