Volume 10 Issue 1
Published: 2025-06-25
Contents
Research Paper
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data
Naglaa Badi Ibrahim, Hana Muhammad Usman,
The increasing of security attacks and unauthorized intrusion have made network security one of the main subjects that should be considered in present data communication environment. Intrusion...
Using Kernel Estimator and K-Mean Clustering Approach to Hand Gesture Recognition
Ban A. Mitras, AAlA Mahmood Mohammed,
In this paper we used non parametric density estimator (Kernel Estimator) to estimate probability density function for Image data of Hand Gesture and warping Hand Gesture and we see the curve for...
Distributed Databases: ERP System as a Case Study Model in the Factory of Fabric and Weave in Mosul
Akram Ahmed Al-Tawil, Bilal Tawfiq Younis,
The Research aim to implementation Distributed Database approach through ERP system that new application for information Technology Owing to the Scarcity of the Arabic studies tackling ERP System...
Cuneiform Symbols Recognition Based on K-Means and Neural Network
Naktal M. Edan,
Cuneiform is the ancient writing systemin the world. But, there is no clear interest recognition cuneiform symbol, despite its importance. This research interested in building an algorithm for...
Using Random Scrambling in Multi Media Encoding
Ghada Mohammad Tahir Qasim,
The research deals with implementation of a new algorithm to encrypt multimedia files this method called random scrambling, to increase the security of the transmitted files, a secret key is used...
Estimate Programmatic Effort using the Traditional COCOMO Model and Neural Networks
Jamal Salah Al-Din Sayed Majeed, Isra Zuhair Majeed Qabaa,
Estimation models in software engineering are used to predict some important and future features for software project such as effort estimation for developing software projects. Failures of...
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System
Najla B. Ibraheem, Muna M. T. Jawhar, Hana M. Osman,
Security has become an important issue for networks. Intrusion detection technology is an effective approach in dealing with the problems of network security. In this paper, we present an intrusion...
Encrypted and Hiding Information in Digital Images using Wavelet Transformation and LSB Technology
Ahmed Hamed Saleh Al-Badrani,
Hiding information is an effective solution for the protection of copyright and confidentiality to allow a person to send the data in the middle of the cover image to a person without knowing any...
Dimensionality Reduction using Hybrid Algorithms and Their Application to Remote Sensing Data
Maha Abdul Rahman Hasso, Mona Jaafar Siddiq,
In this work, A proposed Algorithm has been constructed for the selecting the best band and lessening high dimension of remote sensing data depending on multi algorithms, each on carried out and...
Digital Image Watermarking Scheme Using Discrete Wavelet Transform Domain, Quantization, and Genetic Algorithm
Nasseer Basheer, Shaymaa S Abdulsalam,
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. Watermarking is identified as a major means to achieve copyright...
Design a Tool for Generating Test Cases using Swarm Intelligence
Shahbaa I. Khaleel, Ashraf Abdulmunim Al Thanoon,
In this research, the tools and techniques of artificial intelligence were studied and employed in software engineering. And that was conducted through using the Particle Swarm Optimization PSO and...
Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices
Omar A. Ibrahim, Omar A. AL-Saffar,
Mobile technology is rapidly developed, this developing leads the production of the multimedia smartphone that supports wireless LAN (WLAN) that are widely deployed because of its ease of use,...
Direct Transmission of Products Designs in Distributed Manufacturing
Ammar Thaher Yaseen,
Information and Communication Technique show an efficient technical capabilities for management and controlling the distributed operations among various factories. For this, the industrial...
Three Proposed Hybrid Genetic Algorithms
Nada F. Hassan, Ban A. Mitras,
Genetic Algorithm has been hybridized with classical optimization methods. Hybridization has been done in three approaches, by using conjugate gradient algorithm for Fletcher and Reeves, second by...
Parallel Programming for Solving Linear BVP’s by Linear Superposition using CS_Tools
Bashir Khalaf, Firas Saeed,
The objective of this paper is to speed the solution of linear Boundary Value Problem (LPVPs) by parallel Programming by using cs_tools where the solution methods is the linear superposition...
An Analytical Mathematical Study of Artificial Neural Network Algorithms in the Suitability of a Model for Medical Diagnosis
Omar Saber Qasim, Israa Rustum Mohammed,
In this research discuss the concept of appropriate form, by examining mathematical behavior for three models represent neural networks are (GRNN, BPNN, PNN), were applied two types of medical data...
An Algorithm for Smoker Detection
Hiba Adreese Youni, Saleem Omar, Mafaz Abd Alwahhab, Enas Mqdad,
In this research an algorithm was suggested for studying speech signal properties for both smokers and non smokers then verificate that the person smoker or not based on his speech signal. A data...
Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data
Alaa Jumaa, Sufyan T. F. Al-Janabi, Nazar A. Ali,
Data mining is the process of extracting hidden patterns from data. One of the most important activities in data mining is the association rule mining and the new head for data mining research area...
Development of Traditional Algorithm Used in Denoising to Enhance Contrast of the Color Images
Hanan Ali, Esraa Abd Al-Majed, Asmaa Nadhim, Rahma Saleem,
With the evolution of life and complexity there is a need to use the images in many scientific fields weather forecast, medical, engineering, and the fact that these images are a lot of distortion...
Suggested Method for Audio File Steganography
Saja J. Mohammed, Faris E. Mohammed,
The world is tend now a lot of development in communication field specially in internet , therefore it is very important to find security methods for files that is send from one place to another....
Improved LSB Method using Standard Deviation Scale
Nadia M. Mohammed, Riyam J. Essa, Amina M. Najim,
The concealment of the most important means used by the security institutions with critical communications in all countries of the world, they provided the technology of high security, especially...
Using Artificial Intelligence Techniques For Intrusion Detection System
Manar Y. Ahmed, Bayda I. Khaleel,
Along with the development and growth of the internet network, and the rapid expansion of World Wide Web and local network systems have changed the computing world in the last decade. Nowadays, as...
Electronic Forecasting of Women's Jumping Events using Neural Networks
Fares Ghanem Ahmed, Aida Younis Muhammad, Hala Nafi Fathi,
The aim of this research is to use neural network in future forecasting field to show the of jumping competitions in international Olympics for (2016-2024). Expert system named (AAA) is designed by...
Building a System to People Identification Based on Human Hand Geometry
Maha Abd Alrahman Al-Hasoo, Zeena N. Al-kateeb,
This paper present a new practical authentication system which is depend on one of the biometrics features Hand Geometry features. the proposed system Captures human hand image to extract 50...
Building a Software System Using a Spiral Model to Evaluate the Overall Risk of Projects Using Fuzzy Number Theory
Jamal Salah Al-Din Sayed Majeed, Ro’a Amer Hussain,
This research aims presented a practical application for the process of assessing the overall risk of the projects following the risk management in software engineering steps, the life cycle is the...
Building a Multi-Period Probability Dynamic Inventory Model with Application
Ahmed Mahmoodi Al-Sebaw, Noor Abdul Aziz Hussein,
In this paper addresses the multi-period single-item inventory problem with stochastic demands. In which the demand in each period is known but it varies from time to time for N replenishment...
Identification of Some Variables Affecting the Granting of The Fundamentals of Computer and Internet Certificate (IC3)
Marwan A. Dabdoub, Ahmed M. Esmaeel,
To identify certain variable that influence the result Internet and Computing Core Certification examination (IC3) which is conducted in the ComputerCenter and Internet at the University of Mosul....
The Discrimination of Red Blood Cells Infected by Hereditary Hemolytic Anemia
Ghayda A.A. Al-Talib, Hesham H. Mohameed,
This paper presents a medical application based on digital image processing and Artificial Neural Network (ANN), which can recognize three types of Hereditary Hemolytic Anemia (HHA) that affect the...
Use the Frequency Domain to Hide in Some Audio Files
Zahraa Tarik, Farah T. Mohammd, Ikhlass Thanoon, Azhar Rafie,
In this work, anew hiding algorithm is proposed that depends on using two deferent domain (spatial and frequency) to achieve and provide security and protection for transformed data, which is...
Existing Object Oriented Design Metrics a Study and Comparison
Laheeb M. Al-Zobaidy, Khalil A. Ibrahim,
Software Quality still a vague and multifaceted concept, which means different things to different people, metrics for object oriented design focuses on measurements that are applied to the class...
Design and Implementation of OLAP System for Distributed Data Warehouse
Murtadha M. Hamad, Abdullah F. Mahdi,
Data warehousing and on-line analytical processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. A distributed OLAP system is...
Reconcile an Appropriate Model for the Occurrence of Periods of Infection with Hepatitis C in the Province of Nineveh - A comparative Study with the Geometric Process Model -
Muthanna Subhi Sulaiman, Shaimaa Waleed Mahmood,
In this study we are build a model for the intervals of occurrence of viral hepatitis type C in Nineveh province by using of time-series analysis, and compared with the Geometric process model, and...
Building a Search Engine for the Personal Computer and the Local Network
Fares Adel Dawood, Khaled Hussein, Mohamed Majed,
Computer users need to advanced methods for accessing stored information with at high speed and accurate information retrieval of from among the millions of files stored on a personal computer when...
Use the Genetic Algorithm to Encode and Hide Gray Image Data
Raya Jassim Essa, Reham Jassim Essa, Inam Muhammad Sulaiman,
With the development of means of communication, computer science and information exchange via electronic information networks an urgent need emerged to find ways to save exchanged information....
Hybrid System for Speech Coding Based on Contourlet Transformation
Khalil I. Alsaif, Hadia S. Albadrani,
The main objective of speech coding is to allow the transmission of speech over digital channel of the highest speech quality and least possible bit rate, beside the security purpose. In this...
Modeling and Analyzing Virtual Links Links Between the Sites of the Centers of the University of Mosul
Basil Younis Al-Khayat, Talal Fadel Hussein,
This paper deals with PageRanks which are used in the analysis of web links. It displays an introduction for the concept PageRanks and also some basic theoretical aspects related to it. It...
Suggest a Reverse Engineering Tool to Analyze the Software Source Code Written in Java
Alaa Yassin Taqah, Tawfiq Miqdad Tawfiq,
Reverse engineering has presented solution to a major problem in the development and maintenance of the legacy software which is the process of understanding these software types, It is a difficult...
Botne and Botnet Detection Survey
Manar Y. Ahmad, Maisireem A. Kamal,
Among the various forms of malware, Botnets are emerging as the most serious threat, Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and...
Use of General Regression Artificial Neural Network to Identify the Natural Growth of Head Circumference of the Baby
Susan H. Mohammed, Aesha S. Shaheen, Amera I. Melhum,
Recently, many cases of deformities and health problems that affect the newborn were recorded, because of the known pollutants and radiation. One of these problems is the growth of the child, both...
Adoption of the Co-Occurrence Matrix and Artificial Neural Networks in Fingerprint Recognition
Maysoon Khidr Al-Nuaimi,
This paper presents a new method for fingerprint recognition depending on various sizes of fingerprint images. The proposed algorithm applied on more than 30 fingerprint samples, the results was...
Authentication of Deoxyribo Nucleic Acid (DNA)
Naglaa Badi Ibrahim, Yassin Hikmat Ismail,
random and have the ability to store a large amount of information. DNA sent either in natural form in the test tube (after being processed) or in digital form (a series of nitrogenous bases), in...
Representation of the Wavelet Transform 2D using A 5/3 Filter on the Field Programmable Gate Array
Maha Hasso, Sahla Abdul Ali,
Recently the Wavelet Transform has gained a lot of popularity in the field of signal and image processing, this is due to its capability of providing both time and frequency information...
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems
Dhuha Basheer Abdullah, Amira B. Sallow,
In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the...
State of Art: Semantic Web
Najla B. Ibraheem, Ban Sh. Mustafa,
Semantic Web is an extension to the current web. It will convert the way we use World Wide Web (WWW) by giving the machine the capability to process and infer data in web. It starts as a vision and...
GLM for Image Steganography Technique
Ahmed S. Nori, Noor N. Ahmed, Thana Gh. Ahmed,
An improvement to a Steganography method for hiding data using Gray Level Images is proposed in this paper. The method is an improvement over earlier method named Least Significant Bit (LSB). This...
Hide Compressed Texts in an Audio File
Shahad Abdel-Rahman Hasso,
Steganography art is a technique of hiding data within data, as hiding text message within an image or an audio file or a video file, it is a new method used as a substitute for the known...
The Use of the Artificial Immune Network Algorithm AIN in Distinguishing English Character Pattern
Maha Abd Alellah Mohammad,
The focus of the present research is on the issue of patterns compatibility regarding an English letter through the use of a probable research Algorithm called the Artificial Immune Network (AIN(....